Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
VmjvNTbD5J.exe

Overview

General Information

Sample name:VmjvNTbD5J.exe
renamed because original name is a hash value
Original sample name:8ed2ebe94abc2758e4db53c476f8b7a69b5436fe176cba112802990547c5bb24.exe
Analysis ID:1586717
MD5:ab660c89d26121d4041874614646fd75
SHA1:586cb1d772f7f559786f4f5b2420e5ba5806815b
SHA256:8ed2ebe94abc2758e4db53c476f8b7a69b5436fe176cba112802990547c5bb24
Tags:exeuser-crep1x
Infos:

Detection

Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to record screenshots
Contains functionality to retrieve information about pressed keystrokes
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Deletes files inside the Windows folder
Detected non-DNS traffic on DNS port
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Drops files with a non-matching file extension (content does not match file extension)
Found dropped PE file which has not been started or loaded
Found evaded block containing many API calls
Found evasive API chain (date check)
Found evasive API chain (may stop execution after accessing registry keys)
Found evasive API chain checking for process token information
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the installation date of Windows
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)

Classification

  • System is w10x64
  • VmjvNTbD5J.exe (PID: 6304 cmdline: "C:\Users\user\Desktop\VmjvNTbD5J.exe" MD5: AB660C89D26121D4041874614646FD75)
    • VmjvNTbD5J.exe (PID: 6404 cmdline: "C:\Windows\TEMP\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exe" -burn.clean.room="C:\Users\user\Desktop\VmjvNTbD5J.exe" -burn.filehandle.attached=564 -burn.filehandle.self=572 MD5: B153C388223577EA044ACA3908BE2935)
      • WebCopier.exe (PID: 6556 cmdline: C:\Windows\TEMP\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exe MD5: E2A27870BA4DA90DF6276C4DA9E3CF82)
        • WebCopier.exe (PID: 5264 cmdline: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exe MD5: E2A27870BA4DA90DF6276C4DA9E3CF82)
          • cmd.exe (PID: 1456 cmdline: C:\Windows\SysWOW64\cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 4900 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • EKU_Make_debug_v4.exe (PID: 4548 cmdline: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exe MD5: 967F4470627F823F4D7981E511C9824F)
  • WebCopier.exe (PID: 2364 cmdline: "C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exe" MD5: E2A27870BA4DA90DF6276C4DA9E3CF82)
    • cmd.exe (PID: 1836 cmdline: C:\Windows\SysWOW64\cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • EKU_Make_debug_v4.exe (PID: 6284 cmdline: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exe MD5: 967F4470627F823F4D7981E511C9824F)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WCUtil.dllReversingLabs: Detection: 43%
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeReversingLabs: Detection: 58%
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WCUtil.dllReversingLabs: Detection: 43%
Source: VmjvNTbD5J.exeReversingLabs: Detection: 47%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: C:\Users\user\AppData\Local\Temp\wkvxqcaeJoe Sandbox ML: detected
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570A44CC DecryptFileW,0_2_00007FF6570A44CC
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570A4460 DecryptFileW,0_2_00007FF6570A4460
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570E73D0 CryptAcquireContextW,GetLastError,CryptCreateHash,GetLastError,CryptHashData,ReadFile,GetLastError,CryptDestroyHash,CryptReleaseContext,GetLastError,CryptGetHashParam,GetLastError,SetFilePointerEx,GetLastError,0_2_00007FF6570E73D0
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570A40C4 DecryptFileW,0_2_00007FF6570A40C4
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570A2D04 CreateFileW,GetLastError,DecryptFileW,CloseHandle,0_2_00007FF6570A2D04
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570A2AEC CreateFileW,GetLastError,DecryptFileW,CloseHandle,0_2_00007FF6570A2AEC
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D544CC DecryptFileW,1_2_00007FF743D544CC
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D54460 DecryptFileW,1_2_00007FF743D54460
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D973D0 CryptAcquireContextW,GetLastError,CryptCreateHash,GetLastError,CryptHashData,ReadFile,GetLastError,CryptDestroyHash,CryptReleaseContext,GetLastError,CryptGetHashParam,GetLastError,SetFilePointerEx,GetLastError,1_2_00007FF743D973D0
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D52D04 CreateFileW,GetLastError,DecryptFileW,CloseHandle,1_2_00007FF743D52D04
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D52AEC CreateFileW,GetLastError,DecryptFileW,CloseHandle,1_2_00007FF743D52AEC
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D540C4 DecryptFileW,1_2_00007FF743D540C4
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_1000A940 ?IsEncrypted@CZipFileHeader@@QAE_NXZ,2_2_1000A940
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_10006140 ?CryptDecodeBuffer@CZipArchive@@IAEXK@Z,?CurrentFile@CZipArchive@@IAEPAVCZipFileHeader@@XZ,?IsEncrypted@CZipFileHeader@@QAE_NXZ,?CryptDecode@CZipArchive@@IAEXAAD@Z,2_2_10006140
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_10005980 ?CryptInitKeys@CZipArchive@@IAEXXZ,?CryptUpdateKeys@CZipArchive@@IAEXD@Z,2_2_10005980
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_100059D0 ?CryptUpdateKeys@CZipArchive@@IAEXD@Z,?CryptCRC32@CZipArchive@@IAEKKD@Z,?CryptCRC32@CZipArchive@@IAEKKD@Z,2_2_100059D0
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_10005A30 ?CryptCheck@CZipArchive@@IAE_NXZ,?CryptDecode@CZipArchive@@IAEXAAD@Z,?CurrentFile@CZipArchive@@IAEPAVCZipFileHeader@@XZ,?IsDataDescr@CZipFileHeader@@QAE_NXZ,?CurrentFile@CZipArchive@@IAEPAVCZipFileHeader@@XZ,?CurrentFile@CZipArchive@@IAEPAVCZipFileHeader@@XZ,2_2_10005A30
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_100032A0 ?OpenNewFile@CZipArchive@@QAE_NAAVCZipFileHeader@@HPBD@Z,?IsClosed@CZipArchive@@QAE_N_N@Z,?GetNoEntries@CZipArchive@@QAEHXZ,?SetTime@CZipFileHeader@@QAEXABJ@Z,?SetFileHeaderAttr@CZipArchive@@QAEXAAVCZipFileHeader@@K@Z,?CurrentFile@CZipArchive@@IAEPAVCZipFileHeader@@XZ,?GetFileName@CZipFileHeader@@QAE?AVCZipString@@XZ,?GetNoEntries@CZipArchive@@QAEHXZ,?CurrentFile@CZipArchive@@IAEPAVCZipFileHeader@@XZ,?SetFileName@CZipFileHeader@@QAE_NPBD@Z,?CurrentFile@CZipArchive@@IAEPAVCZipFileHeader@@XZ,?IsDirectory@CZipFileHeader@@QAE_NXZ,?CurrentFile@CZipArchive@@IAEPAVCZipFileHeader@@XZ,?PrepareData@CZipFileHeader@@IAE_NH_N0@Z,?ThrowError@CZipArchive@@IAEXH_N@Z,?CurrentFile@CZipArchive@@IAEPAVCZipFileHeader@@XZ,?WriteLocal@CZipFileHeader@@IAEXAAVCZipStorage@@@Z,?CurrentFile@CZipArchive@@IAEPAVCZipFileHeader@@XZ,?SetFileName@CZipFileHeader@@QAE_NPBD@Z,?CryptCryptHeader@CZipArchive@@IAEXJAAVCZipAutoBuffer@@@Z,?CurrentFile@CZipArchive@@IAEPAVCZipFileHeader@@XZ,?CurrentFile@CZipArchive@@IAEPAVCZipFileHeader@@XZ,?CurrentFile@CZipArchive@@IAEPAVCZipFileHeader@@XZ,?CheckForError@CZipArchive@@IAEXH@Z,2_2_100032A0
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_100042F0 ?WriteNewFile@CZipArchive@@QAE_NPBXK@Z,?CurrentFile@CZipArchive@@IAEPAVCZipFileHeader@@XZ,?CurrentFile@CZipArchive@@IAEPAVCZipFileHeader@@XZ,?CryptEncodeBuffer@CZipArchive@@IAEXXZ,?CurrentFile@CZipArchive@@IAEPAVCZipFileHeader@@XZ,?CheckForError@CZipArchive@@IAEXH@Z,2_2_100042F0
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_10005B00 ?CryptDecryptByte@CZipArchive@@IAEDXZ,2_2_10005B00
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_10005B20 ?CryptDecode@CZipArchive@@IAEXAAD@Z,?CryptDecryptByte@CZipArchive@@IAEDXZ,?CryptUpdateKeys@CZipArchive@@IAEXD@Z,2_2_10005B20
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_10008350 CreateFileMappingA,MapViewOfFile,UnmapViewOfFile,CloseHandle,?IsEncrypted@CZipFileHeader@@QAE_NXZ,?GetCrcAndSizes@CZipFileHeader@@IAEXPAD@Z,UnmapViewOfFile,CloseHandle,UnmapViewOfFile,CloseHandle,2_2_10008350
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_10002BC0 ?OpenFile@CZipArchive@@QAE_NG@Z,?CurrentFile@CZipArchive@@IAEPAVCZipFileHeader@@XZ,?IsEncrypted@CZipFileHeader@@QAE_NXZ,?CryptInitKeys@CZipArchive@@IAEXXZ,?CryptCheck@CZipArchive@@IAE_NXZ,?ThrowError@CZipArchive@@IAEXH_N@Z,?CurrentFile@CZipArchive@@IAEPAVCZipFileHeader@@XZ,?ThrowError@CZipArchive@@IAEXH_N@Z,?CheckForError@CZipArchive@@IAEXH@Z,?CurrentFile@CZipArchive@@IAEPAVCZipFileHeader@@XZ,?CurrentFile@CZipArchive@@IAEPAVCZipFileHeader@@XZ,?IsEncrypted@CZipFileHeader@@QAE_NXZ,?CurrentFile@CZipArchive@@IAEPAVCZipFileHeader@@XZ,2_2_10002BC0
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_10004410 ?CloseNewFile@CZipArchive@@QAE_NXZ,?CurrentFile@CZipArchive@@IAEPAVCZipFileHeader@@XZ,?CryptEncodeBuffer@CZipArchive@@IAEXXZ,?CheckForError@CZipArchive@@IAEXH@Z,?CryptEncodeBuffer@CZipArchive@@IAEXXZ,?CurrentFile@CZipArchive@@IAEPAVCZipFileHeader@@XZ,?CheckForError@CZipArchive@@IAEXH@Z,?CurrentFile@CZipArchive@@IAEPAVCZipFileHeader@@XZ,?CurrentFile@CZipArchive@@IAEPAVCZipFileHeader@@XZ,?EmptyPtrList@CZipArchive@@IAEXXZ,2_2_10004410
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_10005C70 ?CryptCRC32@CZipArchive@@IAEKKD@Z,2_2_10005C70
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_10005CA0 ?CryptCryptHeader@CZipArchive@@IAEXJAAVCZipAutoBuffer@@@Z,?CryptInitKeys@CZipArchive@@IAEXXZ,GetTickCount,_rand,?CryptEncode@CZipArchive@@IAEXAAD@Z,?CryptEncode@CZipArchive@@IAEXAAD@Z,?CryptEncode@CZipArchive@@IAEXAAD@Z,2_2_10005CA0
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_10007D40 ?IsEncrypted@CZipFileHeader@@QAE_NXZ,?IsDataDescr@CZipFileHeader@@QAE_NXZ,?GetCrcAndSizes@CZipFileHeader@@IAEXPAD@Z,2_2_10007D40
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_10005D50 ?CryptEncode@CZipArchive@@IAEXAAD@Z,?CryptDecryptByte@CZipArchive@@IAEDXZ,?CryptUpdateKeys@CZipArchive@@IAEXD@Z,2_2_10005D50
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_10005D80 ?CryptEncodeBuffer@CZipArchive@@IAEXXZ,?CurrentFile@CZipArchive@@IAEPAVCZipFileHeader@@XZ,?IsEncrypted@CZipFileHeader@@QAE_NXZ,?CryptEncode@CZipArchive@@IAEXAAD@Z,2_2_10005D80
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_10005DF0 ?TestFile@CZipArchive@@QAE_NGP6A_NKHPAX@Z0K@Z,?IsDirectory@CZipFileHeader@@QAE_NXZ,?IsEncrypted@CZipFileHeader@@QAE_NXZ,?OpenFile@CZipArchive@@QAE_NG@Z,?ReadFile@CZipArchive@@QAEKPAXK@Z,?CloseFile@CZipArchive@@QAEHPBD_N@Z,2_2_10005DF0
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_10002E60 ?ReadFile@CZipArchive@@QAEKPAXK@Z,?CryptDecodeBuffer@CZipArchive@@IAEXK@Z,?CurrentFile@CZipArchive@@IAEPAVCZipFileHeader@@XZ,?CheckForError@CZipArchive@@IAEXH@Z,2_2_10002E60
Source: VmjvNTbD5J.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Binary string: D:\a\wix4\wix4\build\burn\Release\x64\burn.pdb source: VmjvNTbD5J.exe, 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmp, VmjvNTbD5J.exe, 00000000.00000000.1693692850.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmp, VmjvNTbD5J.exe, 00000001.00000000.1697941753.00007FF743DAF000.00000002.00000001.01000000.00000005.sdmp, VmjvNTbD5J.exe, 00000001.00000002.1710365841.00007FF743DAF000.00000002.00000001.01000000.00000005.sdmp
Source: Binary string: C:\My_Programs\WebCopier\Exe\V7_0\WebCopier.pdb source: WebCopier.exe, 00000002.00000000.1705010990.000000000078F000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000002.00000002.1726654133.000000000078F000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000003.00000000.1724090947.000000000078F000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 00000003.00000002.1786226646.000000000078F000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000000.2105602327.000000000078F000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000002.2165697554.000000000078F000.00000002.00000001.01000000.0000000A.sdmp
Source: Binary string: ntdll.pdb source: EKU_Make_debug_v4.exe, 0000000A.00000002.2185596688.0000000006A20000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2178847576.000000000462F000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2186419661.000000000702C000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2182446383.0000000005228000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2175450883.000000000422A000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2185253552.0000000006821000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171438595.00000000021F0000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2181840298.000000000502A000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2173934671.0000000003E23000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2186593183.0000000007222000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2181085897.0000000004C28000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2184623744.000000000622C000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2180279258.0000000004826000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2182660620.000000000542A000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2182922173.0000000005622000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2174714716.0000000004021000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2183634766.0000000005C2D000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2184843291.0000000006421000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2185036487.0000000006625000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2184382020.0000000006027000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2183952347.0000000005E2F000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2176677960.0000000004422000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2183417000.0000000005A22000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2181375338.0000000004E27000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2172137517.0000000002B50000.00000004.00001000.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2180777683.0000000004A20000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2173093052.0000000003C20000.00000004.00000001.00020000.
Source: Binary string: wntdll.pdbUGP source: WebCopier.exe, 00000002.00000002.1735052890.000000000A1F0000.00000004.00000800.00020000.00000000.sdmp, WebCopier.exe, 00000002.00000002.1734636498.0000000009E93000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791553537.0000000009CC5000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1792072568.000000000A41C000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791805101.000000000A060000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060886824.0000000005980000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060276332.00000000050C0000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2172580985.000000000A48C000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2172253484.000000000A0D0000.00000004.00000800.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2172084559.0000000009D7A000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2341007872.0000000005710000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340383993.0000000004E5F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: ntdll.pdbUGP source: EKU_Make_debug_v4.exe, 0000000A.00000002.2185596688.0000000006A20000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2178847576.000000000462F000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2186419661.000000000702C000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2182446383.0000000005228000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2175450883.000000000422A000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2185253552.0000000006821000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171438595.00000000021F0000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2181840298.000000000502A000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2173934671.0000000003E23000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2186593183.0000000007222000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2181085897.0000000004C28000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2184623744.000000000622C000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2180279258.0000000004826000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2182660620.000000000542A000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2182922173.0000000005622000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2174714716.0000000004021000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2183634766.0000000005C2D000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2184843291.0000000006421000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2185036487.0000000006625000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2184382020.0000000006027000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2183952347.0000000005E2F000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2176677960.0000000004422000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2183417000.0000000005A22000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2181375338.0000000004E27000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2172137517.0000000002B50000.00000004.00001000.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2180777683.0000000004A20000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2173093052.0000000003C20000.00000004.00000001.000200
Source: Binary string: wntdll.pdb source: WebCopier.exe, 00000002.00000002.1735052890.000000000A1F0000.00000004.00000800.00020000.00000000.sdmp, WebCopier.exe, 00000002.00000002.1734636498.0000000009E93000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791553537.0000000009CC5000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1792072568.000000000A41C000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791805101.000000000A060000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060886824.0000000005980000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060276332.00000000050C0000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2172580985.000000000A48C000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2172253484.000000000A0D0000.00000004.00000800.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2172084559.0000000009D7A000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2341007872.0000000005710000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340383993.0000000004E5F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: D:\a\wix4\wix4\build\burn\Release\x64\burn.pdb2 source: VmjvNTbD5J.exe, 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmp, VmjvNTbD5J.exe, 00000000.00000000.1693692850.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmp, VmjvNTbD5J.exe, 00000001.00000000.1697941753.00007FF743DAF000.00000002.00000001.01000000.00000005.sdmp, VmjvNTbD5J.exe, 00000001.00000002.1710365841.00007FF743DAF000.00000002.00000001.01000000.00000005.sdmp
Source: Binary string: f:\cb\11x_main\producers\distiller\products\adobe\plugins\rndrng\wxp\objfre_wnet_amd64\amd64\AdReGP.pdb source: VmjvNTbD5J.exe, VmjvNTbD5J.exe, 00000001.00000002.1707086793.0000000066711000.00000020.00000001.01000000.00000006.sdmp
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570872AC GetFileAttributesW,GetLastError,SetFileAttributesW,GetLastError,FindFirstFileW,GetLastError,SetFileAttributesW,GetLastError,DeleteFileW,MoveFileExW,MoveFileExW,GetLastError,FindNextFileW,GetLastError,RemoveDirectoryW,GetLastError,MoveFileExW,GetLastError,FindClose,0_2_00007FF6570872AC
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570DE914 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF6570DE914
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570F2798 FindFirstFileW,FindClose,0_2_00007FF6570F2798
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570A3CF8 FindFirstFileW,FindNextFileW,FindClose,0_2_00007FF6570A3CF8
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D372AC GetFileAttributesW,GetLastError,SetFileAttributesW,GetLastError,FindFirstFileW,GetLastError,SetFileAttributesW,GetLastError,DeleteFileW,MoveFileExW,MoveFileExW,GetLastError,FindNextFileW,GetLastError,RemoveDirectoryW,GetLastError,MoveFileExW,GetLastError,FindClose,1_2_00007FF743D372AC
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D8E914 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,1_2_00007FF743D8E914
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743DA2798 FindFirstFileW,FindClose,1_2_00007FF743DA2798
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D53CF8 FindFirstFileW,FindNextFileW,FindClose,1_2_00007FF743D53CF8
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_100145C2 FindFirstFileA,GetDriveTypeA,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FindClose,GetLastError,FindClose,2_2_100145C2
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_000000014000A5E0 GetDlgItem,SendMessageW,SendMessageW,SendMessageW,wsprintfW,GetClientRect,SendMessageW,FindFirstFileW,lstrlenW,SendMessageW,FindNextFileW,FindClose,10_2_000000014000A5E0
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_0000000140007628 FindClose,lstrlenW,lstrcpyW,FindFirstFileW,GetFullPathNameW,FindClose,SetLastError,lstrlenW,10_2_0000000140007628
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_000000014000D848 GetLogicalDriveStringsW,GetDlgItem,GetDriveTypeW,_cwprintf_s_l,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SHGetSpecialFolderPathW,lstrlenW,SHGetSpecialFolderPathW,lstrlenW,SendMessageW,SendMessageW,GetDlgItem,SendMessageW,SendMessageW,GetDlgItem,SendMessageW,RegOpenKeyExW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,SendMessageW,SendMessageW,SendMessageW,RegCloseKey,10_2_000000014000D848
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 4x nop then push esi2_2_10004AB0
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 4x nop then push ecx2_2_10004D80
Source: global trafficTCP traffic: 192.168.2.4:61227 -> 162.159.36.2:53
Source: unknownDNS traffic detected: query: plerukilo0.site replaycode: Name error (3)
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: WebCopier.exe, 00000002.00000000.1705222146.000000000087D000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000003.00000000.1724311518.000000000087D000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000000.2105703835.000000000087D000.00000002.00000001.01000000.0000000A.sdmpString found in binary or memory: https://www.youtube.com/watch?v=******* equals www.youtube.com (Youtube)
Source: global trafficDNS traffic detected: DNS query: plerukilo0.site
Source: WebCopier.exe, 00000002.00000000.1705010990.000000000078F000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000002.00000002.1726654133.000000000078F000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000003.00000000.1724090947.000000000078F000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 00000003.00000002.1786226646.000000000078F000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000000.2105602327.000000000078F000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000002.2165697554.000000000078F000.00000002.00000001.01000000.0000000A.sdmpString found in binary or memory: ftp://Welcome.htm_WCerror
Source: VmjvNTbD5J.exeString found in binary or memory: http://appsyndication.org/2006/appsyn
Source: WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCA-1.crt0
Source: WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCodeSigningCA-1.crt0
Source: WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: VmjvNTbD5J.exe, 00000001.00000003.1702791021.00000229D4A49000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703106292.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703378095.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000002.00000003.1720428781.0000000009D9B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
Source: VmjvNTbD5J.exe, 00000001.00000003.1702791021.00000229D4A49000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703106292.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703378095.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000002.00000003.1720428781.0000000009D9B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
Source: VmjvNTbD5J.exe, 00000001.00000003.1702791021.00000229D4A49000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703106292.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703378095.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000002.00000003.1720428781.0000000009D9B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDCA-1.crl08
Source: WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/assured-cs-g1.crl00
Source: WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDCA-1.crl0w
Source: WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/assured-cs-g1.crl0L
Source: WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: VmjvNTbD5J.exe, 00000001.00000003.1702791021.00000229D4A49000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703106292.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703378095.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000002.00000003.1720428781.0000000009D9B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
Source: VmjvNTbD5J.exe, 00000001.00000003.1702791021.00000229D4A49000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000002.00000002.1727274131.0000000000B12000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000002.00000003.1720428781.0000000009D9B000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000000.1724311518.0000000000B12000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000002.2165962906.0000000000B12000.00000002.00000001.01000000.0000000A.sdmpString found in binary or memory: http://itunes.apple.com/WebObjects/MZStore.woa/wa/viewSoftware?id=305594530Khttp://itunes.apple.com/
Source: VmjvNTbD5J.exe, 00000001.00000003.1702791021.00000229D4A49000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703106292.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703378095.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000002.00000003.1720428781.0000000009D9B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
Source: WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
Source: WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
Source: WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0L
Source: WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0O
Source: VmjvNTbD5J.exe, 00000001.00000003.1702791021.00000229D4A49000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703106292.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703378095.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000002.00000003.1720428781.0000000009D9B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
Source: VmjvNTbD5J.exe, 00000001.00000003.1702791021.00000229D4A49000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703106292.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703378095.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000002.00000003.1720428781.0000000009D9B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.thawte.com0
Source: WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
Source: WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://s2.symcb.com0
Source: WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sv.symcb.com/sv.crl0a
Source: WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sv.symcb.com/sv.crt0
Source: WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sv.symcd.com0&
Source: VmjvNTbD5J.exe, 00000001.00000003.1702791021.00000229D4A49000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703106292.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703378095.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000002.00000003.1720428781.0000000009D9B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: VmjvNTbD5J.exe, 00000001.00000003.1702791021.00000229D4A49000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703106292.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703378095.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000002.00000003.1720428781.0000000009D9B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: VmjvNTbD5J.exe, 00000001.00000003.1702791021.00000229D4A49000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703106292.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703378095.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000002.00000003.1720428781.0000000009D9B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: VmjvNTbD5J.exe, 00000000.00000003.1694764990.000002BC4CB09000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000000.00000003.1712279272.000002BC4E4D0000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000000.00000003.1694915894.000002BC4CB09000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000000.00000003.1712493671.000002BC4CB09000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000000.00000003.1694915894.000002BC4CABE000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000000.00000003.1710904366.000002BC4CB09000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000000.00000003.1694875001.000002BC4CABE000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000000.00000003.1694764990.000002BC4CAC7000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000002.1710123901.00000229D6AD0000.00000004.00000800.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000002.1709825331.00000229D6810000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wixtoolset.org/schemas/v4/2008/Burn
Source: VmjvNTbD5J.exe, 00000001.00000002.1710123901.00000229D6AD0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://wixtoolset.org/schemas/v4/2008/BurnH
Source: VmjvNTbD5J.exe, 00000000.00000003.1711503150.000002BC4EC58000.00000004.00000800.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000000.00000003.1711479523.000002BC4EC59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://wixtoolset.org/schemas/v4/2008/Burnp
Source: VmjvNTbD5J.exe, 00000001.00000003.1702791021.00000229D4A49000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703106292.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703378095.00000229D4A30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wixtoolset.org/schemas/v4/BootstrapperApplicationData
Source: VmjvNTbD5J.exe, 00000001.00000003.1703106292.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703378095.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1702791021.00000229D4A39000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wixtoolset.org/schemas/v4/BundleExtensionData
Source: WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2187738743.00000001401E0000.00000002.00000001.01000000.00000010.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.???.xx/?search=%s
Source: WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
Source: WebCopier.exe, 00000002.00000002.1733072531.000000000981B000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.0000000009753000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.0000000005421000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.00000000025F6000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.info-zip.org/
Source: VmjvNTbD5J.exe, 00000001.00000003.1702791021.00000229D4A49000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000002.00000000.1705222146.000000000087D000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000002.00000002.1727274131.0000000000B12000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000002.00000003.1720428781.0000000009D9B000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000000.1724311518.000000000087D000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 00000003.00000000.1724311518.0000000000B12000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000000.2105703835.000000000087D000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000002.2165962906.0000000000B12000.00000002.00000001.01000000.0000000A.sdmpString found in binary or memory: http://www.maximumsoft.com/
Source: VmjvNTbD5J.exe, 00000001.00000003.1702791021.00000229D4A49000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703106292.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703378095.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000002.00000002.1727274131.0000000000B12000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000002.00000003.1720428781.0000000009D9B000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000000.1724311518.0000000000B12000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000002.2165962906.0000000000B12000.00000002.00000001.01000000.0000000A.sdmpString found in binary or memory: http://www.maximumsoft.com/downloads/
Source: VmjvNTbD5J.exe, 00000001.00000003.1702791021.00000229D4A49000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000002.00000002.1727274131.0000000000B12000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000002.00000003.1720428781.0000000009D9B000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000000.1724311518.0000000000B12000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000002.2165962906.0000000000B12000.00000002.00000001.01000000.0000000A.sdmpString found in binary or memory: http://www.maximumsoft.com/index_buy.html
Source: VmjvNTbD5J.exe, 00000001.00000003.1702791021.00000229D4A49000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000002.00000002.1727274131.0000000000B12000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000002.00000003.1720428781.0000000009D9B000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000000.1724311518.0000000000B12000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000002.2165962906.0000000000B12000.00000002.00000001.01000000.0000000A.sdmpString found in binary or memory: http://www.maximumsoft.com/index_skins.html
Source: VmjvNTbD5J.exe, 00000001.00000003.1702791021.00000229D4A49000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000002.00000002.1727274131.0000000000B12000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000002.00000003.1720428781.0000000009D9B000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000000.1724311518.0000000000B12000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000002.2165962906.0000000000B12000.00000002.00000001.01000000.0000000A.sdmpString found in binary or memory: http://www.maximumsoft.com/index_support.html7
Source: VmjvNTbD5J.exe, 00000001.00000003.1702791021.00000229D4A49000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000002.00000002.1727274131.0000000000B12000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000002.00000003.1720428781.0000000009D9B000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000000.1724311518.0000000000B12000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000002.2165962906.0000000000B12000.00000002.00000001.01000000.0000000A.sdmpString found in binary or memory: http://www.maximumsoft.com/index_support.htmlgClick
Source: VmjvNTbD5J.exe, 00000001.00000003.1702791021.00000229D4A49000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000002.00000002.1727274131.0000000000B12000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000002.00000003.1720428781.0000000009D9B000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000000.1724311518.0000000000B12000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000002.2165962906.0000000000B12000.00000002.00000001.01000000.0000000A.sdmpString found in binary or memory: http://www.maximumsoft.com/index_transl.html
Source: WebCopier.exe, 00000002.00000000.1705010990.000000000078F000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000002.00000002.1726654133.000000000078F000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000003.00000000.1724090947.000000000078F000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 00000003.00000002.1786226646.000000000078F000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000000.2105602327.000000000078F000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000002.2165697554.000000000078F000.00000002.00000001.01000000.0000000A.sdmpString found in binary or memory: http://www.maximumsoft.com/products/wc/tour_win_iet.htm
Source: WebCopier.exe, 00000002.00000000.1705010990.000000000078F000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000002.00000002.1726654133.000000000078F000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000003.00000000.1724090947.000000000078F000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 00000003.00000002.1786226646.000000000078F000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000000.2105602327.000000000078F000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000002.2165697554.000000000078F000.00000002.00000001.01000000.0000000A.sdmpString found in binary or memory: http://www.maximumsoft.com/products/wc/tour_win_nt.htm
Source: WebCopier.exe, 00000002.00000000.1705010990.000000000078F000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000002.00000002.1726654133.000000000078F000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000003.00000000.1724090947.000000000078F000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 00000003.00000002.1786226646.000000000078F000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000000.2105602327.000000000078F000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000002.2165697554.000000000078F000.00000002.00000001.01000000.0000000A.sdmpString found in binary or memory: http://www.maximumsoft.com/products/wc/tour_win_t.htm
Source: WebCopier.exe, 00000002.00000000.1705010990.000000000078F000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000002.00000002.1726654133.000000000078F000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000003.00000000.1724090947.000000000078F000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 00000003.00000002.1786226646.000000000078F000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000000.2105602327.000000000078F000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000002.2165697554.000000000078F000.00000002.00000001.01000000.0000000A.sdmpString found in binary or memory: http://www.maximumsoft.com/products/wc/tour_win_t.htmhttp://www.maximumsoft.com/products/wc/tour_win
Source: WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2187738743.00000001401E0000.00000002.00000001.01000000.00000010.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.softwareok.com
Source: EKU_Make_debug_v4.exe, 0000000A.00000002.2187738743.00000001401F4000.00000002.00000001.01000000.00000010.sdmp, EKU_Make_debug_v4.exe, 0000000E.00000002.2462550571.00000001401F4000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: http://www.softwareok.com/?Download=Find.Same.Images.OK
Source: EKU_Make_debug_v4.exe, 0000000A.00000002.2187738743.00000001401F4000.00000002.00000001.01000000.00000010.sdmp, EKU_Make_debug_v4.exe, 0000000E.00000002.2462550571.00000001401F4000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: http://www.softwareok.com/?Freeware/Find.Same.Images.OK
Source: EKU_Make_debug_v4.exe, 0000000A.00000002.2187738743.00000001401F4000.00000002.00000001.01000000.00000010.sdmp, EKU_Make_debug_v4.exe, 0000000E.00000002.2462550571.00000001401F4000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: http://www.softwareok.com/?Freeware/Find.Same.Images.OK/History
Source: EKU_Make_debug_v4.exe, 0000000A.00000002.2187738743.00000001401F4000.00000002.00000001.01000000.00000010.sdmp, EKU_Make_debug_v4.exe, 0000000E.00000002.2462550571.00000001401F4000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: http://www.softwareok.com/?seite=faq-Find.Same.Images.OK&faq=0
Source: WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2187738743.00000001401E0000.00000002.00000001.01000000.00000010.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.softwareok.de
Source: EKU_Make_debug_v4.exe, 0000000A.00000002.2187738743.00000001401F4000.00000002.00000001.01000000.00000010.sdmp, EKU_Make_debug_v4.exe, 0000000E.00000002.2462550571.00000001401F4000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: http://www.softwareok.de/?Download=Find.Same.Images.OK
Source: EKU_Make_debug_v4.exe, 0000000A.00000002.2187738743.00000001401F4000.00000002.00000001.01000000.00000010.sdmp, EKU_Make_debug_v4.exe, 0000000E.00000002.2462550571.00000001401F4000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: http://www.softwareok.de/?Freeware/Find.Same.Images.OK
Source: EKU_Make_debug_v4.exe, 0000000A.00000002.2187738743.00000001401F4000.00000002.00000001.01000000.00000010.sdmp, EKU_Make_debug_v4.exe, 0000000E.00000002.2462550571.00000001401F4000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: http://www.softwareok.de/?Freeware/Find.Same.Images.OK/History
Source: EKU_Make_debug_v4.exe, 0000000A.00000002.2187738743.00000001401F4000.00000002.00000001.01000000.00000010.sdmp, EKU_Make_debug_v4.exe, 0000000E.00000002.2462550571.00000001401F4000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: http://www.softwareok.de/?seite=faq-Find.Same.Images.OK&faq=0
Source: cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.surfok.de/
Source: WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.symauth.com/cps0(
Source: WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.symauth.com/rpa00
Source: WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.vmware.com/0
Source: WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.vmware.com/0/
Source: WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/cps0%
Source: WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/rpa0
Source: EKU_Make_debug_v4.exe, 0000000A.00000003.2165775730.0000000000495000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2155393234.0000000000495000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2153993076.0000000000493000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2170891730.0000000000495000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000E.00000003.2449329946.0000000000548000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000E.00000002.2449720304.0000000000552000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/
Source: EKU_Make_debug_v4.exe, 0000000A.00000003.2153993076.0000000000493000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/$y
Source: EKU_Make_debug_v4.exe, 0000000A.00000003.2156860948.000000000048D000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2156984811.0000000000494000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/I
Source: EKU_Make_debug_v4.exe, 0000000A.00000003.2158291459.000000000048D000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2158447139.0000000000494000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/I8yZ
Source: EKU_Make_debug_v4.exe, 0000000A.00000003.2160391132.0000000000495000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2156860948.000000000048D000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2156984811.0000000000494000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2170891730.0000000000495000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/J
Source: EKU_Make_debug_v4.exe, 0000000E.00000003.2449329946.0000000000548000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000E.00000002.2449720304.0000000000552000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/Ky
Source: EKU_Make_debug_v4.exe, 0000000E.00000002.2449720304.0000000000552000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/U
Source: EKU_Make_debug_v4.exe, 0000000E.00000003.2449329946.0000000000548000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000E.00000002.2449720304.0000000000552000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/V
Source: EKU_Make_debug_v4.exe, 0000000E.00000003.2449329946.0000000000548000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000E.00000002.2449720304.0000000000552000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/Wy
Source: EKU_Make_debug_v4.exe, 0000000A.00000003.2163893352.000000000048D000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2164153156.0000000000494000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/Xyz
Source: EKU_Make_debug_v4.exe, 0000000A.00000002.2170891730.000000000042C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/d
Source: EKU_Make_debug_v4.exe, 0000000A.00000003.2163893352.000000000048D000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2162238370.0000000000494000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2161989373.000000000048D000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2164153156.0000000000494000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/dy~
Source: EKU_Make_debug_v4.exe, 0000000E.00000002.2450928590.0000000002D86000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/proprietes
Source: EKU_Make_debug_v4.exe, 0000000E.00000002.2450928590.0000000002D86000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/proprietes0$
Source: EKU_Make_debug_v4.exe, 0000000A.00000002.2172416660.0000000002D66000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/proprietes6z
Source: EKU_Make_debug_v4.exe, 0000000E.00000003.2449329946.0000000000548000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/proprietes?hnjw3jwgcrj=viecBZ17TbrJ0plncMPhyySmKom8GzHFEOPa51csL1qYzU39OAnqM
Source: EKU_Make_debug_v4.exe, 0000000A.00000002.2172416660.0000000002D66000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/proprietesGHz
Source: EKU_Make_debug_v4.exe, 0000000E.00000002.2450928590.0000000002D86000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/proprietesQ
Source: EKU_Make_debug_v4.exe, 0000000A.00000002.2172416660.0000000002D66000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/proprietesS
Source: EKU_Make_debug_v4.exe, 0000000A.00000003.2163893352.000000000048D000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2164153156.0000000000494000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2165775730.0000000000495000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/py
Source: EKU_Make_debug_v4.exe, 0000000A.00000003.2158291459.000000000048D000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2155475609.000000000048D000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2158447139.0000000000494000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2156860948.000000000048D000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2155617581.0000000000494000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2156984811.0000000000494000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site/ty
Source: EKU_Make_debug_v4.exe, 0000000A.00000003.2165775730.00000000004AD000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2165586598.00000000004AE000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2161959109.00000000004B1000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2163736974.00000000004AE000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2167947962.00000000004BB000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2166390533.00000000004AE000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2163861233.00000000004B1000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2167818938.00000000004B9000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000E.00000003.2435323872.000000000055E000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000E.00000003.2448000505.000000000055E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site:443
Source: EKU_Make_debug_v4.exe, 0000000A.00000002.2170891730.000000000042C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site:443/proprietes?hnjw3jwgcrj=viecBZ17TbrJ0plncMPhyySmKom8GzHFEOPa51csL1qYzU39O
Source: EKU_Make_debug_v4.exe, 0000000E.00000003.2448000505.000000000055E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site:4436N
Source: EKU_Make_debug_v4.exe, 0000000A.00000003.2165775730.00000000004AD000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2166390533.00000000004AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site:443G
Source: EKU_Make_debug_v4.exe, 0000000E.00000003.2448000505.000000000055E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site:443X
Source: EKU_Make_debug_v4.exe, 0000000A.00000003.2161959109.00000000004B1000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2161832944.00000000004AE000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2160051819.00000000004B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plerukilo0.site:443x
Source: VmjvNTbD5J.exe, 00000001.00000003.1702791021.00000229D4A49000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703106292.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703378095.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000002.00000003.1720428781.0000000009D9B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
Source: WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0
Source: WebCopier.exe, 00000002.00000000.1705222146.000000000087D000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000003.00000000.1724311518.000000000087D000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000000.2105703835.000000000087D000.00000002.00000001.01000000.0000000A.sdmpString found in binary or memory: https://www.youtube.com/watch?v=
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_0000000140007860 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SetClipboardData,CloseClipboard,10_2_0000000140007860
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_0000000140007860 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SetClipboardData,CloseClipboard,10_2_0000000140007860
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_0000000140007274 GetDlgItem,GetDlgItem,GetWindowRect,ScreenToClient,ScreenToClient,GetClientRect,CreateDIBSection,GetDC,CreateCompatibleDC,SelectObject,SelectObject,ReleaseDC,SendMessageW,10_2_0000000140007274
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00000001400038A8 KillTimer,GetAsyncKeyState,SetTimer,10_2_00000001400038A8
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_000000014011FF38 CreateFileW,malloc,ReadFile,NtClose,10_2_000000014011FF38
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeFile deleted: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeJump to behavior
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570894640_2_00007FF657089464
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570902380_2_00007FF657090238
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570872AC0_2_00007FF6570872AC
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF657084D480_2_00007FF657084D48
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF657089C840_2_00007FF657089C84
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF65709EB980_2_00007FF65709EB98
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570A1BE00_2_00007FF6570A1BE0
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570F58AC0_2_00007FF6570F58AC
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570D88D40_2_00007FF6570D88D4
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570DE9140_2_00007FF6570DE914
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570DD77C0_2_00007FF6570DD77C
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570C37AC0_2_00007FF6570C37AC
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570947F80_2_00007FF6570947F8
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570E18300_2_00007FF6570E1830
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570D86C80_2_00007FF6570D86C8
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF65709C5C80_2_00007FF65709C5C8
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570D94A00_2_00007FF6570D94A0
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570D84BC0_2_00007FF6570D84BC
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570FC3640_2_00007FF6570FC364
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570B93B40_2_00007FF6570B93B4
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570FA3AC0_2_00007FF6570FA3AC
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570E63980_2_00007FF6570E6398
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570E73D00_2_00007FF6570E73D0
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570AB24C0_2_00007FF6570AB24C
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570922840_2_00007FF657092284
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF65708B1400_2_00007FF65708B140
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570B81800_2_00007FF6570B8180
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570C81840_2_00007FF6570C8184
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570BF1E40_2_00007FF6570BF1E4
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF65709B0680_2_00007FF65709B068
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570CA0F00_2_00007FF6570CA0F0
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570DD0FC0_2_00007FF6570DD0FC
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570C2E380_2_00007FF6570C2E38
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570D2E580_2_00007FF6570D2E58
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570F1ED00_2_00007FF6570F1ED0
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570CAEF00_2_00007FF6570CAEF0
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570BCD540_2_00007FF6570BCD54
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF657087D600_2_00007FF657087D60
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570DCC680_2_00007FF6570DCC68
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570E1CCC0_2_00007FF6570E1CCC
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570B7D100_2_00007FF6570B7D10
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570F7D000_2_00007FF6570F7D00
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570BFC300_2_00007FF6570BFC30
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570BDC200_2_00007FF6570BDC20
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF657099C1C0_2_00007FF657099C1C
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570FAA500_2_00007FF6570FAA50
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570BBA3C0_2_00007FF6570BBA3C
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570DBA800_2_00007FF6570DBA80
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570CEAC00_2_00007FF6570CEAC0
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570EB9E00_2_00007FF6570EB9E0
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_667122301_2_66712230
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_667158FC1_2_667158FC
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_667140D41_2_667140D4
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_667136C81_2_667136C8
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D394641_2_00007FF743D39464
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D402381_2_00007FF743D40238
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D39C841_2_00007FF743D39C84
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D4EB981_2_00007FF743D4EB98
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D34D481_2_00007FF743D34D48
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D884BC1_2_00007FF743D884BC
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D894A01_2_00007FF743D894A0
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D973D01_2_00007FF743D973D0
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D963981_2_00007FF743D96398
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D693B41_2_00007FF743D693B4
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743DAA3AC1_2_00007FF743DAA3AC
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743DAC3641_2_00007FF743DAC364
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D372AC1_2_00007FF743D372AC
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D422841_2_00007FF743D42284
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D5B24C1_2_00007FF743D5B24C
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D6F1E41_2_00007FF743D6F1E4
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D781841_2_00007FF743D78184
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D681801_2_00007FF743D68180
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D3B1401_2_00007FF743D3B140
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D8E9141_2_00007FF743D8E914
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D888D41_2_00007FF743D888D4
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743DA58AC1_2_00007FF743DA58AC
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D918301_2_00007FF743D91830
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D447F81_2_00007FF743D447F8
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D737AC1_2_00007FF743D737AC
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D8D77C1_2_00007FF743D8D77C
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D886C81_2_00007FF743D886C8
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D4C5C81_2_00007FF743D4C5C8
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743DA7D001_2_00007FF743DA7D00
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D67D101_2_00007FF743D67D10
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D91CCC1_2_00007FF743D91CCC
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D8CC681_2_00007FF743D8CC68
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D49C1C1_2_00007FF743D49C1C
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D6DC201_2_00007FF743D6DC20
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D6FC301_2_00007FF743D6FC30
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D51BE01_2_00007FF743D51BE0
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D7EAC01_2_00007FF743D7EAC0
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D8BA801_2_00007FF743D8BA80
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D6BA3C1_2_00007FF743D6BA3C
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743DAAA501_2_00007FF743DAAA50
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D9B9E01_2_00007FF743D9B9E0
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D8D0FC1_2_00007FF743D8D0FC
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D7A0F01_2_00007FF743D7A0F0
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D4B0681_2_00007FF743D4B068
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D7AEF01_2_00007FF743D7AEF0
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743DA1ED01_2_00007FF743DA1ED0
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D82E581_2_00007FF743D82E58
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D72E381_2_00007FF743D72E38
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D37D601_2_00007FF743D37D60
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D6CD541_2_00007FF743D6CD54
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_100100902_2_10010090
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_1000D9002_2_1000D900
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_100111802_2_10011180
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_1000FA1E2_2_1000FA1E
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_10016A982_2_10016A98
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_1001F3B72_2_1001F3B7
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_1000DDC02_2_1000DDC0
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_10011DD02_2_10011DD0
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_10012E102_2_10012E10
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_100117002_2_10011700
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_10013F402_2_10013F40
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_1000F7CE2_2_1000F7CE
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_000000014000BFFC10_2_000000014000BFFC
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_000000014001D00010_2_000000014001D000
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_000000014000B82410_2_000000014000B824
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_000000014002F83810_2_000000014002F838
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_000000014000D84810_2_000000014000D848
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_000000014002106810_2_0000000140021068
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_000000014000909C10_2_000000014000909C
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00000001400238F810_2_00000001400238F8
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_000000014001A9B810_2_000000014001A9B8
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00000001400041C810_2_00000001400041C8
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00000001400231CC10_2_00000001400231CC
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_0000000140021A0010_2_0000000140021A00
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_000000014000E21410_2_000000014000E214
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_0000000140024A7810_2_0000000140024A78
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_000000014001F2A410_2_000000014001F2A4
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_000000014000A37810_2_000000014000A378
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_0000000140122B9810_2_0000000140122B98
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_000000014001339010_2_0000000140013390
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_0000000140020BB810_2_0000000140020BB8
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_000000014000142410_2_0000000140001424
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_0000000140008C3C10_2_0000000140008C3C
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_000000014000545010_2_0000000140005450
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_000000014000D45810_2_000000014000D458
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_000000014011B45010_2_000000014011B450
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_000000014001048C10_2_000000014001048C
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00000001400EE4C410_2_00000001400EE4C4
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00000001400FC53C10_2_00000001400FC53C
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_000000014000A5E010_2_000000014000A5E0
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_0000000140022E3010_2_0000000140022E30
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_000000014002267C10_2_000000014002267C
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_000000014001AE8810_2_000000014001AE88
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_0000000140011EF410_2_0000000140011EF4
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00000001400FF71410_2_00000001400FF714
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_000000014001DF4410_2_000000014001DF44
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_0000000140040F4810_2_0000000140040F48
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_000000014001879010_2_0000000140018790
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF63750678010_2_00007FF637506780
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF637491E7010_2_00007FF637491E70
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF63749267010_2_00007FF637492670
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF63748C58010_2_00007FF63748C580
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF63748AD4010_2_00007FF63748AD40
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF63748445010_2_00007FF637484450
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF63748F53010_2_00007FF63748F530
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF63748CCF010_2_00007FF63748CCF0
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF637594B6010_2_00007FF637594B60
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF63748B36010_2_00007FF63748B360
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF637506A6010_2_00007FF637506A60
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF63748808010_2_00007FF637488080
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF63748404010_2_00007FF637484040
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF6374D311010_2_00007FF6374D3110
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF6374826A010_2_00007FF6374826A0
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF63750612010_2_00007FF637506120
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF6374888D010_2_00007FF6374888D0
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF6374848F010_2_00007FF6374848F0
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF637489CD010_2_00007FF637489CD0
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF6375948D010_2_00007FF6375948D0
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF6374C0F9010_2_00007FF6374C0F90
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF63750375010_2_00007FF637503750
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF6374ADF4010_2_00007FF6374ADF40
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF63748874010_2_00007FF637488740
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF637488FD010_2_00007FF637488FD0
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF637505E9010_2_00007FF637505E90
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF63748BE8010_2_00007FF63748BE80
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF6376146A010_2_00007FF6376146A0
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF63748F6A010_2_00007FF63748F6A0
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF637594E9010_2_00007FF637594E90
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF6374D5EA010_2_00007FF6374D5EA0
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF6374826A010_2_00007FF6374826A0
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF637486E4010_2_00007FF637486E40
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF63748CCF010_2_00007FF63748CCF0
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF63748A71010_2_00007FF63748A710
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF637487F3010_2_00007FF637487F30
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF6374826A010_2_00007FF6374826A0
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF6374C058010_2_00007FF6374C0580
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF6374895A010_2_00007FF6374895A0
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF6374D2D4010_2_00007FF6374D2D40
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF637492E3010_2_00007FF637492E30
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF63748DC8010_2_00007FF63748DC80
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF6374875E010_2_00007FF6374875E0
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF63750649010_2_00007FF637506490
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF6374D649010_2_00007FF6374D6490
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF63748DC8010_2_00007FF63748DC80
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF6374C0CB010_2_00007FF6374C0CB0
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF637584C7010_2_00007FF637584C70
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF6374BE51010_2_00007FF6374BE510
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF63748445010_2_00007FF637484450
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF637490D0010_2_00007FF637490D00
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF637489CD010_2_00007FF637489CD0
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF6375844E010_2_00007FF6375844E0
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF63748A3B010_2_00007FF63748A3B0
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF63749234010_2_00007FF637492340
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF637481B3A10_2_00007FF637481B3A
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF637481B3A10_2_00007FF637481B3A
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF6374ABB7010_2_00007FF6374ABB70
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF63748136010_2_00007FF637481360
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF637487C0010_2_00007FF637487C00
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF63748D3E010_2_00007FF63748D3E0
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF6375A13D010_2_00007FF6375A13D0
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF63748DA9010_2_00007FF63748DA90
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF6374899D010_2_00007FF6374899D0
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF6374892B010_2_00007FF6374892B0
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF63755829210_2_00007FF637558292
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF637486E4010_2_00007FF637486E40
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF63753424010_2_00007FF637534240
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF637481B0610_2_00007FF637481B06
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF63748830010_2_00007FF637488300
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF63748EAFC10_2_00007FF63748EAFC
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF6374AB2F010_2_00007FF6374AB2F0
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF63748FAE010_2_00007FF63748FAE0
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF6374D29B010_2_00007FF6374D29B0
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF63748414010_2_00007FF637484140
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF6374D620010_2_00007FF6374D6200
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF6374899D010_2_00007FF6374899D0
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF6374879C810_2_00007FF6374879C8
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exe B22BF1210B5FD173A210EBFA9092390AA0513C41E1914CBE161EB547F049EF91
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: String function: 00007FF6570812B4 appears 394 times
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: String function: 00007FF6570812B0 appears 359 times
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: String function: 00007FF6570831DC appears 50 times
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: String function: 00007FF65708C0C0 appears 65 times
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: String function: 00007FF6570EE988 appears 89 times
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: String function: 00007FF63748F6A0 appears 51 times
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: String function: 00007FF743D312B4 appears 394 times
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: String function: 00007FF743D9E988 appears 89 times
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: String function: 00007FF743D312B0 appears 359 times
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: String function: 00007FF743D331DC appears 50 times
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: String function: 00007FF743D3C0C0 appears 65 times
Source: EKU_Make_debug_v4.exe.4.drStatic PE information: Resource name: ZIP type: Zip archive data (empty)
Source: wkvxqcae.4.drStatic PE information: Number of sections : 12 > 10
Source: VmjvNTbD5J.exeBinary or memory string: OriginalFilename vs VmjvNTbD5J.exe
Source: VmjvNTbD5J.exe, 00000000.00000000.1693852223.00007FF657140000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamethresh.exe8 vs VmjvNTbD5J.exe
Source: VmjvNTbD5J.exeBinary or memory string: OriginalFilename vs VmjvNTbD5J.exe
Source: VmjvNTbD5J.exe, 00000001.00000002.1707165908.0000000066719000.00000002.00000001.01000000.00000006.sdmpBinary or memory string: OriginalFilenameADREGP.DLLV vs VmjvNTbD5J.exe
Source: VmjvNTbD5J.exe, 00000001.00000002.1710481958.00007FF743DF0000.00000002.00000001.01000000.00000005.sdmpBinary or memory string: OriginalFilenamethresh.exe8 vs VmjvNTbD5J.exe
Source: classification engineClassification label: mal84.evad.winEXE@18/20@2/0
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570E7928 FormatMessageW,GetLastError,LocalFree,0_2_00007FF6570E7928
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570E8F38 LookupPrivilegeValueW,GetLastError,OpenProcessToken,GetLastError,AdjustTokenPrivileges,GetLastError,GetLastError,CloseHandle,0_2_00007FF6570E8F38
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D98F38 LookupPrivilegeValueW,GetLastError,OpenProcessToken,GetLastError,AdjustTokenPrivileges,GetLastError,GetLastError,CloseHandle,1_2_00007FF743D98F38
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_1000B320 GetDiskFreeSpaceA,2_2_1000B320
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570EE4B8 GetModuleHandleA,GetLastError,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CoCreateInstance,ExitProcess,0_2_00007FF6570EE4B8
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570F6D00 FindResourceExA,GetLastError,LoadResource,GetLastError,SizeofResource,GetLastError,LockResource,GetLastError,0_2_00007FF6570F6D00
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570C3D48 ChangeServiceConfigW,GetLastError,0_2_00007FF6570C3D48
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeFile created: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5Jump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4900:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3164:120:WilError_03
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeFile created: C:\Users\user\AppData\Local\Temp\Acupressure_20250109084342.cleanroom.logJump to behavior
Source: VmjvNTbD5J.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\SysWOW64\cmd.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: VmjvNTbD5J.exeReversingLabs: Detection: 47%
Source: VmjvNTbD5J.exeString found in binary or memory: Failed to re-launch bundle process after RunOnce: %ls
Source: VmjvNTbD5J.exeString found in binary or memory: Failed to re-launch bundle process after RunOnce: %ls
Source: EKU_Make_debug_v4.exeString found in binary or memory: -install -runas
Source: EKU_Make_debug_v4.exeString found in binary or memory: -install
Source: EKU_Make_debug_v4.exeString found in binary or memory: -install -nolisense
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeFile read: C:\Users\user\Desktop\VmjvNTbD5J.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\VmjvNTbD5J.exe "C:\Users\user\Desktop\VmjvNTbD5J.exe"
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeProcess created: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exe "C:\Windows\TEMP\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exe" -burn.clean.room="C:\Users\user\Desktop\VmjvNTbD5J.exe" -burn.filehandle.attached=564 -burn.filehandle.self=572
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeProcess created: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exe C:\Windows\TEMP\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exe
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeProcess created: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exe C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exe
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exe C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exe
Source: unknownProcess created: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exe "C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exe"
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exe C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exe
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeProcess created: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exe "C:\Windows\TEMP\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exe" -burn.clean.room="C:\Users\user\Desktop\VmjvNTbD5J.exe" -burn.filehandle.attached=564 -burn.filehandle.self=572Jump to behavior
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeProcess created: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exe C:\Windows\TEMP\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeJump to behavior
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeProcess created: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exe C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeJump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exe C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeJump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exe C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeJump to behavior
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeSection loaded: msi.dllJump to behavior
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeSection loaded: msxml3.dllJump to behavior
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeSection loaded: feclient.dllJump to behavior
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeSection loaded: msxml3.dllJump to behavior
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeSection loaded: feclient.dllJump to behavior
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeSection loaded: wcutil.dllJump to behavior
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeSection loaded: oledlg.dllJump to behavior
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeSection loaded: winmm.dllJump to behavior
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeSection loaded: pla.dllJump to behavior
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeSection loaded: tdh.dllJump to behavior
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeSection loaded: wevtapi.dllJump to behavior
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeSection loaded: shdocvw.dllJump to behavior
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeSection loaded: wcutil.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeSection loaded: oledlg.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeSection loaded: pla.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeSection loaded: pdh.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeSection loaded: tdh.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeSection loaded: wevtapi.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeSection loaded: shdocvw.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: bitsproxy.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: shdocvw.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeSection loaded: wcutil.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeSection loaded: oledlg.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeSection loaded: pla.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeSection loaded: pdh.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeSection loaded: tdh.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeSection loaded: wevtapi.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeSection loaded: shdocvw.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: shdocvw.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{F6D90F11-9C73-11D3-B32E-00C04F990BB4}\InProcServer32Jump to behavior
Source: toxpkftoidctr.4.drLNK file: ..\..\Roaming\ChromeQuick_DVBv5\WebCopier.exe
Source: VmjvNTbD5J.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: VmjvNTbD5J.exeStatic file information: File size 7884295 > 1048576
Source: VmjvNTbD5J.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: VmjvNTbD5J.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: VmjvNTbD5J.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: VmjvNTbD5J.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: VmjvNTbD5J.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: VmjvNTbD5J.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: VmjvNTbD5J.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: VmjvNTbD5J.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\a\wix4\wix4\build\burn\Release\x64\burn.pdb source: VmjvNTbD5J.exe, 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmp, VmjvNTbD5J.exe, 00000000.00000000.1693692850.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmp, VmjvNTbD5J.exe, 00000001.00000000.1697941753.00007FF743DAF000.00000002.00000001.01000000.00000005.sdmp, VmjvNTbD5J.exe, 00000001.00000002.1710365841.00007FF743DAF000.00000002.00000001.01000000.00000005.sdmp
Source: Binary string: C:\My_Programs\WebCopier\Exe\V7_0\WebCopier.pdb source: WebCopier.exe, 00000002.00000000.1705010990.000000000078F000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000002.00000002.1726654133.000000000078F000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000003.00000000.1724090947.000000000078F000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 00000003.00000002.1786226646.000000000078F000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000000.2105602327.000000000078F000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000002.2165697554.000000000078F000.00000002.00000001.01000000.0000000A.sdmp
Source: Binary string: ntdll.pdb source: EKU_Make_debug_v4.exe, 0000000A.00000002.2185596688.0000000006A20000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2178847576.000000000462F000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2186419661.000000000702C000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2182446383.0000000005228000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2175450883.000000000422A000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2185253552.0000000006821000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171438595.00000000021F0000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2181840298.000000000502A000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2173934671.0000000003E23000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2186593183.0000000007222000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2181085897.0000000004C28000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2184623744.000000000622C000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2180279258.0000000004826000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2182660620.000000000542A000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2182922173.0000000005622000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2174714716.0000000004021000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2183634766.0000000005C2D000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2184843291.0000000006421000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2185036487.0000000006625000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2184382020.0000000006027000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2183952347.0000000005E2F000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2176677960.0000000004422000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2183417000.0000000005A22000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2181375338.0000000004E27000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2172137517.0000000002B50000.00000004.00001000.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2180777683.0000000004A20000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2173093052.0000000003C20000.00000004.00000001.00020000.
Source: Binary string: wntdll.pdbUGP source: WebCopier.exe, 00000002.00000002.1735052890.000000000A1F0000.00000004.00000800.00020000.00000000.sdmp, WebCopier.exe, 00000002.00000002.1734636498.0000000009E93000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791553537.0000000009CC5000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1792072568.000000000A41C000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791805101.000000000A060000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060886824.0000000005980000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060276332.00000000050C0000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2172580985.000000000A48C000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2172253484.000000000A0D0000.00000004.00000800.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2172084559.0000000009D7A000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2341007872.0000000005710000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340383993.0000000004E5F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: ntdll.pdbUGP source: EKU_Make_debug_v4.exe, 0000000A.00000002.2185596688.0000000006A20000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2178847576.000000000462F000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2186419661.000000000702C000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2182446383.0000000005228000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2175450883.000000000422A000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2185253552.0000000006821000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171438595.00000000021F0000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2181840298.000000000502A000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2173934671.0000000003E23000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2186593183.0000000007222000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2181085897.0000000004C28000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2184623744.000000000622C000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2180279258.0000000004826000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2182660620.000000000542A000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2182922173.0000000005622000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2174714716.0000000004021000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2183634766.0000000005C2D000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2184843291.0000000006421000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2185036487.0000000006625000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2184382020.0000000006027000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2183952347.0000000005E2F000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2176677960.0000000004422000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2183417000.0000000005A22000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2181375338.0000000004E27000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2172137517.0000000002B50000.00000004.00001000.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2180777683.0000000004A20000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2173093052.0000000003C20000.00000004.00000001.000200
Source: Binary string: wntdll.pdb source: WebCopier.exe, 00000002.00000002.1735052890.000000000A1F0000.00000004.00000800.00020000.00000000.sdmp, WebCopier.exe, 00000002.00000002.1734636498.0000000009E93000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791553537.0000000009CC5000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1792072568.000000000A41C000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791805101.000000000A060000.00000004.00000800.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060886824.0000000005980000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060276332.00000000050C0000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2172580985.000000000A48C000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2172253484.000000000A0D0000.00000004.00000800.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2172084559.0000000009D7A000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2341007872.0000000005710000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340383993.0000000004E5F000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: D:\a\wix4\wix4\build\burn\Release\x64\burn.pdb2 source: VmjvNTbD5J.exe, 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmp, VmjvNTbD5J.exe, 00000000.00000000.1693692850.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmp, VmjvNTbD5J.exe, 00000001.00000000.1697941753.00007FF743DAF000.00000002.00000001.01000000.00000005.sdmp, VmjvNTbD5J.exe, 00000001.00000002.1710365841.00007FF743DAF000.00000002.00000001.01000000.00000005.sdmp
Source: Binary string: f:\cb\11x_main\producers\distiller\products\adobe\plugins\rndrng\wxp\objfre_wnet_amd64\amd64\AdReGP.pdb source: VmjvNTbD5J.exe, VmjvNTbD5J.exe, 00000001.00000002.1707086793.0000000066711000.00000020.00000001.01000000.00000006.sdmp
Source: VmjvNTbD5J.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: VmjvNTbD5J.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: VmjvNTbD5J.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: VmjvNTbD5J.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: VmjvNTbD5J.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_1001AA2F LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,2_2_1001AA2F
Source: Pedlary.dll.1.drStatic PE information: real checksum: 0xd3c8 should be: 0x10a4a
Source: WCUtil.dll.1.drStatic PE information: real checksum: 0x0 should be: 0x2dc11
Source: WCUtil.dll.2.drStatic PE information: real checksum: 0x0 should be: 0x2dc11
Source: VmjvNTbD5J.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x778cbb
Source: VmjvNTbD5J.exeStatic PE information: real checksum: 0x0 should be: 0x78600c
Source: wkvxqcae.4.drStatic PE information: real checksum: 0x269089 should be: 0x273aaf
Source: VmjvNTbD5J.exeStatic PE information: section name: .didat
Source: VmjvNTbD5J.exeStatic PE information: section name: .wixburn
Source: VmjvNTbD5J.exeStatic PE information: section name: _RDATA
Source: VmjvNTbD5J.exe.0.drStatic PE information: section name: .didat
Source: VmjvNTbD5J.exe.0.drStatic PE information: section name: .wixburn
Source: VmjvNTbD5J.exe.0.drStatic PE information: section name: _RDATA
Source: EKU_Make_debug_v4.exe.4.drStatic PE information: section name: Shared
Source: wkvxqcae.4.drStatic PE information: section name: .xdata
Source: wkvxqcae.4.drStatic PE information: section name: epj
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_1001AA00 push eax; ret 2_2_1001AA2E
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_1001E714 push eax; ret 2_2_1001E732
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_000000014001282D push 8B480014h; retf 10_2_0000000140012832
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_000000014001D949 push rsp; ret 10_2_000000014001D94B
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_0000000140013D4C pushfq ; ret 10_2_0000000140013D4D
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_0000000140013DE5 pushfq ; ret 10_2_0000000140013DE6
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_0000000140013F26 pushfq ; ret 10_2_0000000140013F27
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF637488740 push rax; retf 10_2_00007FF6374888C3
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF637483805 push rax; retf 10_2_00007FF637483806
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF637483817 push rax; retf 10_2_00007FF637483818
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF637483FDD push rdx; retf 10_2_00007FF637483FDE
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF6374815EA push rax; retf 10_2_00007FF6374823F2
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF637486C6A push FFFFFFEAh; iretd 10_2_00007FF637486C6D
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeFile created: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeJump to dropped file
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeFile created: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\Pedlary.dllJump to dropped file
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeFile created: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WCUtil.dllJump to dropped file
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\yirxmaoeJump to dropped file
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeFile created: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WCUtil.dllJump to dropped file
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\wkvxqcaeJump to dropped file
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeFile created: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeJump to dropped file
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeJump to dropped file
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeFile created: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeJump to dropped file
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeFile created: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\Pedlary.dllJump to dropped file
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeFile created: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WCUtil.dllJump to dropped file
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeFile created: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeJump to dropped file
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeFile created: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeJump to dropped file
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\wkvxqcaeJump to dropped file
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\yirxmaoeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00000001400853D4 GetPrivateProfileStringW,lstrlenW,10_2_00000001400853D4

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\SysWOW64\cmd.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\WKVXQCAE
Source: C:\Windows\SysWOW64\cmd.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\YIRXMAOE
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeAPI/Special instruction interceptor: Address: 6CD57C44
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeAPI/Special instruction interceptor: Address: 6CD57C44
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeAPI/Special instruction interceptor: Address: 6CD57945
Source: C:\Windows\SysWOW64\cmd.exeAPI/Special instruction interceptor: Address: 6CD53B54
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeDropped PE file which has not been started: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\Pedlary.dllJump to dropped file
Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\yirxmaoeJump to dropped file
Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\wkvxqcaeJump to dropped file
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeEvaded block: after key decision
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeEvasive API call chain: GetLocalTime,DecisionNodes
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleep
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeAPI coverage: 2.9 %
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeAPI coverage: 1.5 %
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exe TID: 6388Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exe TID: 4868Thread sleep time: -240000s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exe TID: 5472Thread sleep time: -120000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570E7A38 GetLocalTime followed by cmp: cmp esi, 05h and CTI: je 00007FF6570E7AFAh0_2_00007FF6570E7A38
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570E7A38 GetLocalTime followed by cmp: cmp esi, 01h and CTI: je 00007FF6570E7AF1h0_2_00007FF6570E7A38
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D97A38 GetLocalTime followed by cmp: cmp esi, 05h and CTI: je 00007FF743D97AFAh1_2_00007FF743D97A38
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D97A38 GetLocalTime followed by cmp: cmp esi, 01h and CTI: je 00007FF743D97AF1h1_2_00007FF743D97A38
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570872AC GetFileAttributesW,GetLastError,SetFileAttributesW,GetLastError,FindFirstFileW,GetLastError,SetFileAttributesW,GetLastError,DeleteFileW,MoveFileExW,MoveFileExW,GetLastError,FindNextFileW,GetLastError,RemoveDirectoryW,GetLastError,MoveFileExW,GetLastError,FindClose,0_2_00007FF6570872AC
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570DE914 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF6570DE914
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570F2798 FindFirstFileW,FindClose,0_2_00007FF6570F2798
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570A3CF8 FindFirstFileW,FindNextFileW,FindClose,0_2_00007FF6570A3CF8
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D372AC GetFileAttributesW,GetLastError,SetFileAttributesW,GetLastError,FindFirstFileW,GetLastError,SetFileAttributesW,GetLastError,DeleteFileW,MoveFileExW,MoveFileExW,GetLastError,FindNextFileW,GetLastError,RemoveDirectoryW,GetLastError,MoveFileExW,GetLastError,FindClose,1_2_00007FF743D372AC
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D8E914 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,1_2_00007FF743D8E914
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743DA2798 FindFirstFileW,FindClose,1_2_00007FF743DA2798
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D53CF8 FindFirstFileW,FindNextFileW,FindClose,1_2_00007FF743D53CF8
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_100145C2 FindFirstFileA,GetDriveTypeA,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FindClose,GetLastError,FindClose,2_2_100145C2
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_000000014000A5E0 GetDlgItem,SendMessageW,SendMessageW,SendMessageW,wsprintfW,GetClientRect,SendMessageW,FindFirstFileW,lstrlenW,SendMessageW,FindNextFileW,FindClose,10_2_000000014000A5E0
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_0000000140007628 FindClose,lstrlenW,lstrcpyW,FindFirstFileW,GetFullPathNameW,FindClose,SetLastError,lstrlenW,10_2_0000000140007628
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_000000014000D848 GetLogicalDriveStringsW,GetDlgItem,GetDriveTypeW,_cwprintf_s_l,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SHGetSpecialFolderPathW,lstrlenW,SHGetSpecialFolderPathW,lstrlenW,SendMessageW,SendMessageW,GetDlgItem,SendMessageW,SendMessageW,GetDlgItem,SendMessageW,RegOpenKeyExW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,SendMessageW,SendMessageW,SendMessageW,RegCloseKey,10_2_000000014000D848
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570FDEE0 VirtualQuery,GetSystemInfo,0_2_00007FF6570FDEE0
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeThread delayed: delay time: 30000Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
Source: cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: noreply@vmware.com0
Source: cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: http://www.vmware.com/0
Source: cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware, Inc.1!0
Source: WebCopier.exe, 00000002.00000000.1705222146.000000000087D000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000003.00000000.1724311518.000000000087D000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000000.2105703835.000000000087D000.00000002.00000001.01000000.0000000A.sdmpBinary or memory string: aihgfs
Source: cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: http://www.vmware.com/0/
Source: cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware, Inc.1
Source: cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware, Inc.0
Source: EKU_Make_debug_v4.exe, 0000000A.00000002.2170891730.000000000042C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeAPI call chain: ExitProcess graph end node
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeAPI call chain: ExitProcess graph end node
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeAPI call chain: ExitProcess graph end node
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570DA42C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6570DA42C
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_1001AA2F LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,2_2_1001AA2F
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF657086A48 GetProcessHeap,RtlFreeHeap,GetLastError,0_2_00007FF657086A48
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570D44D0 SetUnhandledExceptionFilter,0_2_00007FF6570D44D0
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570DA42C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6570DA42C
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570D42EC IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6570D42EC
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570D3DE4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF6570D3DE4
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_66715040 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_66715040
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D844D0 SetUnhandledExceptionFilter,1_2_00007FF743D844D0
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D8A42C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FF743D8A42C
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D842EC IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FF743D842EC
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_00007FF743D83DE4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00007FF743D83DE4
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_10017C4A SetUnhandledExceptionFilter,2_2_10017C4A
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: 2_2_10017C5C SetUnhandledExceptionFilter,2_2_10017C5C
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_00007FF6374811B5 Sleep,exit,SetUnhandledExceptionFilter,exit,10_2_00007FF6374811B5

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtClose: Direct from: 0x7FF654161B3F
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtQueryInformationProcess: Direct from: 0x7FF654074E4DJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtQueryValueKey: Direct from: 0x14011D93EJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtCreateFile: Direct from: 0x7FF63767D111Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF63748C691Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtReadFile: Direct from: 0x7FF63751B6F3Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF63751B65BJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtReadVirtualMemory: Direct from: 0x7FF653FF8A4DJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtCreateFile: Direct from: 0x7FF65415F4FCJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtSetInformationProcess: Direct from: 0x7FF653FEFB8DJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtClose: Indirect: 0x14012000F
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF6541608D8Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF65404DF12Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtQueryInformationProcess: Direct from: 0x7FF654001447Jump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeNtProtectVirtualMemory: Direct from: 0x6F843882Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtQueryInformationToken: Direct from: 0x7FF63756AAF2Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtClose: Direct from: 0x7FF654161B4D
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtSetInformationProcess: Direct from: 0x7FF653FF0043Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FFE221C26A1Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtCreateFile: Direct from: 0x7FF63751B4C9Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF653F64472Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtAllocateVirtualMemory: Direct from: 0x14011D808Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF63756DA4AJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtMapViewOfSection: Direct from: 0x7FF6541604AAJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtOpenKeyEx: Direct from: 0x7FF637539C13Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtMapViewOfSection: Direct from: 0x7FF653F6F65AJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF637484472Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtSetInformationThread: Direct from: 0x7FF65416A237Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF6376808D8Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtQueryValueKey: Direct from: 0x7FF63753AD3AJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtClose: Direct from: 0x7FF637681B4D
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtProtectVirtualMemory: Direct from: 0x7FF63748F65AJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtClose: Direct from: 0x7FF654161B2B
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeNtQuerySystemInformation: Direct from: 0x10002918Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtSetInformationProcess: Direct from: 0x7FF654000F49Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF653F6C691Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtQuerySystemInformation: Direct from: 0x7FF637684ECAJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtProtectVirtualMemory: Direct from: 0x7FF63768BE06Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF65404AAF2Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF63748AD78Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtQueryValueKey: Direct from: 0x7FF65401A1C6Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtClose: Direct from: 0x7FF63767F51A
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF654017C4CJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF653F612F8Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtSetInformationProcess: Direct from: 0x7FF637521F2EJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtQueryValueKey: Direct from: 0x7FF65401B100Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtClose: Direct from: 0x14011D864
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FFE221E4B5EJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF63749208CJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF637571304Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtQuerySystemInformation: Direct from: 0x7FF63756DF12Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtQueryInformationProcess: Direct from: 0x7FF637521447Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtClose: Direct from: 0x7FF637681B2B
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtProtectVirtualMemory: Direct from: 0x7FF637510043Jump to behavior
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeNtProtectVirtualMemory: Direct from: 0x76EF7B2EJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtQueryValueKey: Direct from: 0x7FF65401A514Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtSetInformationProcess: Direct from: 0x7FF637520F49Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtCreateThreadEx: Direct from: 0x7FF637484B8BJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtQueryValueKey: Direct from: 0x7FF63753A1C6Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtCreateThreadEx: Direct from: 0x7FF63748484DJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF63756D07CJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF653F7208CJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtProtectVirtualMemory: Direct from: 0x7FF6375141C9Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtClose: Direct from: 0x7FF637681B3F
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtProtectVirtualMemory: Direct from: 0x7FF65416BD2EJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtQueryValueKey: Direct from: 0x7FF63753B100Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtCreateFile: Direct from: 0x7FF63767F4FCJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtSetInformationProcess: Direct from: 0x7FF654001F2EJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtReadFile: Direct from: 0x7FF653FFB6F3Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF653FFB65BJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtQueryInformationToken: Direct from: 0x7FF637537C4CJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtClose: Direct from: 0x7FF65415F51A
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtQueryValueKey: Direct from: 0x7FF65401AD3AJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtQueryInformationProcess: Direct from: 0x7FF654001033Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtClose: Direct from: 0x7FF63752178F
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtClose: Direct from: 0x7FF65400178F
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtQueryInformationProcess: Direct from: 0x7FF637521033Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF63751CC67Jump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeNtProtectVirtualMemory: Direct from: 0x6CCDD3EEJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF653F6AD78Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtReadFile: Direct from: 0x14011D832Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtProtectVirtualMemory: Direct from: 0x7FF63768A237Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtClose: Direct from: 0x7FF65401AAF0
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtOpenKeyEx: Direct from: 0x7FF654019C13Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtQueryInformationProcess: Direct from: 0x7FF654164ECAJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtCreateFile: Direct from: 0x14011D7A4Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtCreateFile: Direct from: 0x7FF653FFB4C9Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF65404D07CJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF653F71BDEJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtQuerySystemInformation: Direct from: 0x7FF63750FB8DJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtCreateFile: Direct from: 0x7FF65415D111Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF654051304Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtReadVirtualMemory: Direct from: 0x7FF637518A4DJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtQueryValueKey: Direct from: 0x7FF63753A514Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtProtectVirtualMemory: Direct from: 0x7FF6376804AAJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtAllocateVirtualMemory: Direct from: 0x140120A3CJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtCreateThreadEx: Direct from: 0x7FF653F6484DJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtCreateThreadEx: Direct from: 0x7FF653F64B8BJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtProtectVirtualMemory: Direct from: 0x7FF63768BD2EJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtAllocateVirtualMemory: Direct from: 0x7FF653FFCC67Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeNtQuerySystemInformation: Direct from: 0x7FF637594E4DJump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeSection loaded: NULL target: C:\Windows\SysWOW64\cmd.exe protection: read writeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: NULL target: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exe protection: read writeJump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeSection loaded: NULL target: C:\Windows\SysWOW64\cmd.exe protection: read writeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: NULL target: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exe protection: read writeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exe base: 14011BC08Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exe base: 28F010Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exe base: 14011BC08Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exe base: 3F5010Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeCode function: 10_2_000000014000BFFC CharLowerW,lstrcmpiW,lstrcmpiW,lstrlenW,lstrlenW,lstrcmpiW,lstrcmpW,lstrlenW,GetActiveWindow,GetTempPathW,lstrlenW,GetModuleFileNameW,CopyFileW,MessageBoxW,lstrlenW,ShellExecuteW,GetModuleFileNameW,CharLowerW,lstrlenW,10_2_000000014000BFFC
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeProcess created: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exe "C:\Windows\TEMP\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exe" -burn.clean.room="C:\Users\user\Desktop\VmjvNTbD5J.exe" -burn.filehandle.attached=564 -burn.filehandle.self=572Jump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exe C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeJump to behavior
Source: C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exe C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeJump to behavior
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570EB9E0 InitializeSecurityDescriptor,GetLastError,CreateWellKnownSid,GetLastError,CreateWellKnownSid,GetLastError,CreateWellKnownSid,GetLastError,CreateWellKnownSid,GetLastError,CreateWellKnownSid,GetLastError,SetEntriesInAclA,SetSecurityDescriptorOwner,GetLastError,SetSecurityDescriptorGroup,GetLastError,SetSecurityDescriptorDacl,GetLastError,CoInitializeSecurity,LocalFree,0_2_00007FF6570EB9E0
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570E8ABC AllocateAndInitializeSid,CheckTokenMembership,0_2_00007FF6570E8ABC
Source: WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: )[%d] Shell_TrayWndTrayNotifyWnd
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570E5E80 cpuid 0_2_00007FF6570E5E80
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: GetLocaleInfoA,MultiByteToWideChar,2_2_1001D810
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: GetLocaleInfoW,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoW,GetLocaleInfoW,WideCharToMultiByte,2_2_1001D866
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: EnumSystemLocalesA,2_2_1001C8A8
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: GetLocaleInfoW,WideCharToMultiByte,2_2_1001D929
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: EnumSystemLocalesA,2_2_1001C9BB
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: GetLocaleInfoA,2_2_1001CBAF
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: GetLocaleInfoA,IsValidCodePage,IsValidLocale,2_2_1001C448
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: EnumSystemLocalesA,2_2_1001C61D
Source: C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exeCode function: GetLocaleInfoW,GetLocaleInfoA,GetLocaleInfoW,GetLocaleInfoA,GetLocaleInfoA,MultiByteToWideChar,2_2_1001D753
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDateJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570A0488 GetLastError,CreateNamedPipeW,GetLastError,CreateNamedPipeW,GetLastError,CreateNamedPipeW,GetLastError,CloseHandle,CloseHandle,LocalFree,0_2_00007FF6570A0488
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF657084D48 GetLocalTime,CreateFileW,GetLastError,Sleep,CloseHandle,0_2_00007FF657084D48
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF65708AF70 GetUserNameW,GetLastError,0_2_00007FF65708AF70
Source: C:\Users\user\Desktop\VmjvNTbD5J.exeCode function: 0_2_00007FF6570FCDF0 GetTimeZoneInformation,SystemTimeToTzSpecificLocalTime,0_2_00007FF6570FCDF0
Source: C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exeCode function: 1_2_6671447C GetVersion,memset,GetModuleFileNameA,PathRemoveFileSpecA,PathAppendA,??2@YAPEAX_K@Z,GetFileVersionInfoA,VerQueryValueA,??3@YAXPEAX@Z,1_2_6671447C
Source: C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts4
Native API
11
DLL Side-Loading
1
Exploitation for Privilege Escalation
1
Deobfuscate/Decode Files or Information
11
Input Capture
12
System Time Discovery
Remote Services1
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts2
Command and Scripting Interpreter
1
Windows Service
1
Abuse Elevation Control Mechanism
1
Abuse Elevation Control Mechanism
LSASS Memory1
Account Discovery
Remote Desktop Protocol1
Screen Capture
1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
Service Execution
Logon Script (Windows)11
DLL Side-Loading
3
Obfuscated Files or Information
Security Account Manager4
File and Directory Discovery
SMB/Windows Admin Shares11
Input Capture
1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
Access Token Manipulation
11
DLL Side-Loading
NTDS146
System Information Discovery
Distributed Component Object Model2
Clipboard Data
Protocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
Windows Service
1
File Deletion
LSA Secrets221
Security Software Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts213
Process Injection
21
Masquerading
Cached Domain Credentials2
Process Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
Virtualization/Sandbox Evasion
DCSync11
Virtualization/Sandbox Evasion
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
Access Token Manipulation
Proc Filesystem1
System Owner/User Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt213
Process Injection
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1586717 Sample: VmjvNTbD5J.exe Startdate: 09/01/2025 Architecture: WINDOWS Score: 84 59 plerukilo0.site 2->59 67 Multi AV Scanner detection for dropped file 2->67 69 Multi AV Scanner detection for submitted file 2->69 71 Machine Learning detection for dropped file 2->71 73 AI detected suspicious sample 2->73 11 VmjvNTbD5J.exe 8 2->11         started        14 WebCopier.exe 1 2->14         started        signatures3 process4 file5 57 C:\Windows\Temp\...\VmjvNTbD5J.exe, PE32+ 11->57 dropped 17 VmjvNTbD5J.exe 15 11->17         started        89 Maps a DLL or memory area into another process 14->89 91 Found direct / indirect Syscall (likely to bypass EDR) 14->91 21 cmd.exe 2 14->21         started        signatures6 process7 file8 43 C:\Windows\Temp\...\WebCopier.exe, PE32 17->43 dropped 45 C:\Windows\Temp\...\WCUtil.dll, PE32 17->45 dropped 47 C:\Windows\Temp\...\Pedlary.dll, PE32+ 17->47 dropped 61 Multi AV Scanner detection for dropped file 17->61 23 WebCopier.exe 5 17->23         started        63 Writes to foreign memory regions 21->63 65 Maps a DLL or memory area into another process 21->65 27 EKU_Make_debug_v4.exe 21->27         started        29 conhost.exe 21->29         started        signatures9 process10 file11 53 C:\Users\user\AppData\...\WebCopier.exe, PE32 23->53 dropped 55 C:\Users\user\AppData\Roaming\...\WCUtil.dll, PE32 23->55 dropped 85 Switches to a custom stack to bypass stack traces 23->85 87 Found direct / indirect Syscall (likely to bypass EDR) 23->87 31 WebCopier.exe 1 23->31         started        signatures12 process13 signatures14 93 Maps a DLL or memory area into another process 31->93 95 Switches to a custom stack to bypass stack traces 31->95 97 Found direct / indirect Syscall (likely to bypass EDR) 31->97 34 cmd.exe 5 31->34         started        process15 file16 49 C:\Users\user\AppData\Local\Temp\wkvxqcae, PE32+ 34->49 dropped 51 C:\Users\user\...KU_Make_debug_v4.exe, PE32+ 34->51 dropped 75 Writes to foreign memory regions 34->75 77 Found hidden mapped module (file has been removed from disk) 34->77 79 Maps a DLL or memory area into another process 34->79 81 Switches to a custom stack to bypass stack traces 34->81 38 EKU_Make_debug_v4.exe 34->38         started        41 conhost.exe 34->41         started        signatures17 process18 signatures19 83 Found direct / indirect Syscall (likely to bypass EDR) 38->83

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
VmjvNTbD5J.exe47%ReversingLabsWin64.Trojan.Rugmi
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\wkvxqcae100%Joe Sandbox ML
C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exe0%ReversingLabs
C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WCUtil.dll43%ReversingLabsWin32.Trojan.Generic
C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exe0%ReversingLabs
C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exe58%ReversingLabsWin64.Trojan.Nekark
C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\Pedlary.dll0%ReversingLabs
C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WCUtil.dll43%ReversingLabsWin32.Trojan.Generic
C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://plerukilo0.site:443G0%Avira URL Cloudsafe
https://plerukilo0.site/J0%Avira URL Cloudsafe
https://plerukilo0.site:443X0%Avira URL Cloudsafe
http://www.maximumsoft.com/products/wc/tour_win_t.htm0%Avira URL Cloudsafe
https://plerukilo0.site/$y0%Avira URL Cloudsafe
ftp://Welcome.htm_WCerror0%Avira URL Cloudsafe
https://plerukilo0.site/proprietes0$0%Avira URL Cloudsafe
http://wixtoolset.org/schemas/v4/BootstrapperApplicationData0%Avira URL Cloudsafe
https://plerukilo0.site/I0%Avira URL Cloudsafe
http://wixtoolset.org/schemas/v4/2008/BurnH0%Avira URL Cloudsafe
http://www.softwareok.de/?Freeware/Find.Same.Images.OK0%Avira URL Cloudsafe
https://plerukilo0.site/Ky0%Avira URL Cloudsafe
http://www.softwareok.de/?seite=faq-Find.Same.Images.OK&faq=00%Avira URL Cloudsafe
https://plerukilo0.site/ty0%Avira URL Cloudsafe
https://plerukilo0.site/py0%Avira URL Cloudsafe
http://www.maximumsoft.com/products/wc/tour_win_t.htmhttp://www.maximumsoft.com/products/wc/tour_win0%Avira URL Cloudsafe
https://plerukilo0.site:4430%Avira URL Cloudsafe
http://www.maximumsoft.com/index_buy.html0%Avira URL Cloudsafe
http://wixtoolset.org/schemas/v4/2008/Burn0%Avira URL Cloudsafe
https://plerukilo0.site/d0%Avira URL Cloudsafe
http://www.maximumsoft.com/downloads/0%Avira URL Cloudsafe
https://plerukilo0.site/U0%Avira URL Cloudsafe
https://plerukilo0.site:443/proprietes?hnjw3jwgcrj=viecBZ17TbrJ0plncMPhyySmKom8GzHFEOPa51csL1qYzU39O0%Avira URL Cloudsafe
https://plerukilo0.site/proprietes?hnjw3jwgcrj=viecBZ17TbrJ0plncMPhyySmKom8GzHFEOPa51csL1qYzU39OAnqM0%Avira URL Cloudsafe
http://www.softwareok.de/?Freeware/Find.Same.Images.OK/History0%Avira URL Cloudsafe
http://wixtoolset.org/schemas/v4/BundleExtensionData0%Avira URL Cloudsafe
https://plerukilo0.site/proprietes6z0%Avira URL Cloudsafe
http://www.maximumsoft.com/0%Avira URL Cloudsafe
https://plerukilo0.site/Wy0%Avira URL Cloudsafe
https://plerukilo0.site/V0%Avira URL Cloudsafe
http://www.maximumsoft.com/products/wc/tour_win_nt.htm0%Avira URL Cloudsafe
http://www.softwareok.de/?Download=Find.Same.Images.OK0%Avira URL Cloudsafe
https://plerukilo0.site/proprietesQ0%Avira URL Cloudsafe
http://www.maximumsoft.com/index_support.htmlgClick0%Avira URL Cloudsafe
https://plerukilo0.site/I8yZ0%Avira URL Cloudsafe
https://plerukilo0.site/0%Avira URL Cloudsafe
https://plerukilo0.site/proprietesS0%Avira URL Cloudsafe
http://www.maximumsoft.com/index_skins.html0%Avira URL Cloudsafe
http://www.maximumsoft.com/index_support.html70%Avira URL Cloudsafe
https://plerukilo0.site/dy~0%Avira URL Cloudsafe
https://plerukilo0.site/Xyz0%Avira URL Cloudsafe
http://www.maximumsoft.com/products/wc/tour_win_iet.htm0%Avira URL Cloudsafe
https://plerukilo0.site/proprietes0%Avira URL Cloudsafe
http://www.maximumsoft.com/index_transl.html0%Avira URL Cloudsafe
https://plerukilo0.site/proprietesGHz0%Avira URL Cloudsafe
https://plerukilo0.site:4436N0%Avira URL Cloudsafe
http://wixtoolset.org/schemas/v4/2008/Burnp0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
plerukilo0.site
unknown
unknownfalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://plerukilo0.site:443XEKU_Make_debug_v4.exe, 0000000E.00000003.2448000505.000000000055E000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://plerukilo0.site/IEKU_Make_debug_v4.exe, 0000000A.00000003.2156860948.000000000048D000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2156984811.0000000000494000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://www.vmware.com/0WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      http://www.softwareok.com/?Freeware/Find.Same.Images.OK/HistoryEKU_Make_debug_v4.exe, 0000000A.00000002.2187738743.00000001401F4000.00000002.00000001.01000000.00000010.sdmp, EKU_Make_debug_v4.exe, 0000000E.00000002.2462550571.00000001401F4000.00000002.00000001.01000000.00000010.sdmpfalse
        high
        http://ocsp.sectigo.com0VmjvNTbD5J.exe, 00000001.00000003.1702791021.00000229D4A49000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703106292.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703378095.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000002.00000003.1720428781.0000000009D9B000.00000004.00000001.00020000.00000000.sdmpfalse
          high
          https://plerukilo0.site/JEKU_Make_debug_v4.exe, 0000000A.00000003.2160391132.0000000000495000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2156860948.000000000048D000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2156984811.0000000000494000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2170891730.0000000000495000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.maximumsoft.com/products/wc/tour_win_t.htmWebCopier.exe, 00000002.00000000.1705010990.000000000078F000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000002.00000002.1726654133.000000000078F000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000003.00000000.1724090947.000000000078F000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 00000003.00000002.1786226646.000000000078F000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000000.2105602327.000000000078F000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000002.2165697554.000000000078F000.00000002.00000001.01000000.0000000A.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.softwareok.com/?Freeware/Find.Same.Images.OKEKU_Make_debug_v4.exe, 0000000A.00000002.2187738743.00000001401F4000.00000002.00000001.01000000.00000010.sdmp, EKU_Make_debug_v4.exe, 0000000E.00000002.2462550571.00000001401F4000.00000002.00000001.01000000.00000010.sdmpfalse
            high
            https://plerukilo0.site/proprietes0$EKU_Make_debug_v4.exe, 0000000E.00000002.2450928590.0000000002D86000.00000004.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://plerukilo0.site/$yEKU_Make_debug_v4.exe, 0000000A.00000003.2153993076.0000000000493000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://wixtoolset.org/schemas/v4/2008/BurnHVmjvNTbD5J.exe, 00000001.00000002.1710123901.00000229D6AD0000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            ftp://Welcome.htm_WCerrorWebCopier.exe, 00000002.00000000.1705010990.000000000078F000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000002.00000002.1726654133.000000000078F000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000003.00000000.1724090947.000000000078F000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 00000003.00000002.1786226646.000000000078F000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000000.2105602327.000000000078F000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000002.2165697554.000000000078F000.00000002.00000001.01000000.0000000A.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://plerukilo0.site:443GEKU_Make_debug_v4.exe, 0000000A.00000003.2165775730.00000000004AD000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2166390533.00000000004AE000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#VmjvNTbD5J.exe, 00000001.00000003.1702791021.00000229D4A49000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703106292.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703378095.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000002.00000003.1720428781.0000000009D9B000.00000004.00000001.00020000.00000000.sdmpfalse
              high
              http://wixtoolset.org/schemas/v4/BootstrapperApplicationDataVmjvNTbD5J.exe, 00000001.00000003.1702791021.00000229D4A49000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703106292.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703378095.00000229D4A30000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.softwareok.de/?Freeware/Find.Same.Images.OKEKU_Make_debug_v4.exe, 0000000A.00000002.2187738743.00000001401F4000.00000002.00000001.01000000.00000010.sdmp, EKU_Make_debug_v4.exe, 0000000E.00000002.2462550571.00000001401F4000.00000002.00000001.01000000.00000010.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://plerukilo0.site/dEKU_Make_debug_v4.exe, 0000000A.00000002.2170891730.000000000042C000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://plerukilo0.site/tyEKU_Make_debug_v4.exe, 0000000A.00000003.2158291459.000000000048D000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2155475609.000000000048D000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2158447139.0000000000494000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2156860948.000000000048D000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2155617581.0000000000494000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2156984811.0000000000494000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://plerukilo0.site:443EKU_Make_debug_v4.exe, 0000000A.00000003.2165775730.00000000004AD000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2165586598.00000000004AE000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2161959109.00000000004B1000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2163736974.00000000004AE000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2167947962.00000000004BB000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2166390533.00000000004AE000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2163861233.00000000004B1000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2167818938.00000000004B9000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000E.00000003.2435323872.000000000055E000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000E.00000003.2448000505.000000000055E000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://crl.thawte.com/ThawteTimestampingCA.crl0VmjvNTbD5J.exe, 00000001.00000003.1702791021.00000229D4A49000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703106292.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703378095.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000002.00000003.1720428781.0000000009D9B000.00000004.00000001.00020000.00000000.sdmpfalse
                high
                https://plerukilo0.site/pyEKU_Make_debug_v4.exe, 0000000A.00000003.2163893352.000000000048D000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2164153156.0000000000494000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2165775730.0000000000495000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://wixtoolset.org/schemas/v4/2008/BurnVmjvNTbD5J.exe, 00000000.00000003.1694764990.000002BC4CB09000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000000.00000003.1712279272.000002BC4E4D0000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000000.00000003.1694915894.000002BC4CB09000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000000.00000003.1712493671.000002BC4CB09000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000000.00000003.1694915894.000002BC4CABE000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000000.00000003.1710904366.000002BC4CB09000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000000.00000003.1694875001.000002BC4CABE000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000000.00000003.1694764990.000002BC4CAC7000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000002.1710123901.00000229D6AD0000.00000004.00000800.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000002.1709825331.00000229D6810000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://plerukilo0.site/KyEKU_Make_debug_v4.exe, 0000000E.00000003.2449329946.0000000000548000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000E.00000002.2449720304.0000000000552000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.maximumsoft.com/products/wc/tour_win_t.htmhttp://www.maximumsoft.com/products/wc/tour_winWebCopier.exe, 00000002.00000000.1705010990.000000000078F000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000002.00000002.1726654133.000000000078F000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000003.00000000.1724090947.000000000078F000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 00000003.00000002.1786226646.000000000078F000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000000.2105602327.000000000078F000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000002.2165697554.000000000078F000.00000002.00000001.01000000.0000000A.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.maximumsoft.com/index_buy.htmlVmjvNTbD5J.exe, 00000001.00000003.1702791021.00000229D4A49000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000002.00000002.1727274131.0000000000B12000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000002.00000003.1720428781.0000000009D9B000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000000.1724311518.0000000000B12000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000002.2165962906.0000000000B12000.00000002.00000001.01000000.0000000A.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.softwareok.de/?seite=faq-Find.Same.Images.OK&faq=0EKU_Make_debug_v4.exe, 0000000A.00000002.2187738743.00000001401F4000.00000002.00000001.01000000.00000010.sdmp, EKU_Make_debug_v4.exe, 0000000E.00000002.2462550571.00000001401F4000.00000002.00000001.01000000.00000010.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.maximumsoft.com/downloads/VmjvNTbD5J.exe, 00000001.00000003.1702791021.00000229D4A49000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703106292.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703378095.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000002.00000002.1727274131.0000000000B12000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000002.00000003.1720428781.0000000009D9B000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000000.1724311518.0000000000B12000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000002.2165962906.0000000000B12000.00000002.00000001.01000000.0000000A.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.softwareok.deWebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2187738743.00000001401E0000.00000002.00000001.01000000.00000010.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://plerukilo0.site/proprietes?hnjw3jwgcrj=viecBZ17TbrJ0plncMPhyySmKom8GzHFEOPa51csL1qYzU39OAnqMEKU_Make_debug_v4.exe, 0000000E.00000003.2449329946.0000000000548000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://plerukilo0.site/UEKU_Make_debug_v4.exe, 0000000E.00000002.2449720304.0000000000552000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://plerukilo0.site:443/proprietes?hnjw3jwgcrj=viecBZ17TbrJ0plncMPhyySmKom8GzHFEOPa51csL1qYzU39OEKU_Make_debug_v4.exe, 0000000A.00000002.2170891730.000000000042C000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.softwareok.de/?Freeware/Find.Same.Images.OK/HistoryEKU_Make_debug_v4.exe, 0000000A.00000002.2187738743.00000001401F4000.00000002.00000001.01000000.00000010.sdmp, EKU_Make_debug_v4.exe, 0000000E.00000002.2462550571.00000001401F4000.00000002.00000001.01000000.00000010.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://plerukilo0.site/VEKU_Make_debug_v4.exe, 0000000E.00000003.2449329946.0000000000548000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000E.00000002.2449720304.0000000000552000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.softwareok.com/?Download=Find.Same.Images.OKEKU_Make_debug_v4.exe, 0000000A.00000002.2187738743.00000001401F4000.00000002.00000001.01000000.00000010.sdmp, EKU_Make_debug_v4.exe, 0000000E.00000002.2462550571.00000001401F4000.00000002.00000001.01000000.00000010.sdmpfalse
                    high
                    http://www.maximumsoft.com/VmjvNTbD5J.exe, 00000001.00000003.1702791021.00000229D4A49000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000002.00000000.1705222146.000000000087D000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000002.00000002.1727274131.0000000000B12000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000002.00000003.1720428781.0000000009D9B000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000000.1724311518.000000000087D000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 00000003.00000000.1724311518.0000000000B12000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000000.2105703835.000000000087D000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000002.2165962906.0000000000B12000.00000002.00000001.01000000.0000000A.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://plerukilo0.site/WyEKU_Make_debug_v4.exe, 0000000E.00000003.2449329946.0000000000548000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000E.00000002.2449720304.0000000000552000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://plerukilo0.site/proprietes6zEKU_Make_debug_v4.exe, 0000000A.00000002.2172416660.0000000002D66000.00000004.00000001.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://sectigo.com/CPS0VmjvNTbD5J.exe, 00000001.00000003.1702791021.00000229D4A49000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703106292.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703378095.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000002.00000003.1720428781.0000000009D9B000.00000004.00000001.00020000.00000000.sdmpfalse
                      high
                      http://wixtoolset.org/schemas/v4/BundleExtensionDataVmjvNTbD5J.exe, 00000001.00000003.1703106292.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703378095.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1702791021.00000229D4A39000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.maximumsoft.com/products/wc/tour_win_nt.htmWebCopier.exe, 00000002.00000000.1705010990.000000000078F000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000002.00000002.1726654133.000000000078F000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000003.00000000.1724090947.000000000078F000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 00000003.00000002.1786226646.000000000078F000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000000.2105602327.000000000078F000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000002.2165697554.000000000078F000.00000002.00000001.01000000.0000000A.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://plerukilo0.site/proprietesQEKU_Make_debug_v4.exe, 0000000E.00000002.2450928590.0000000002D86000.00000004.00000001.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.softwareok.de/?Download=Find.Same.Images.OKEKU_Make_debug_v4.exe, 0000000A.00000002.2187738743.00000001401F4000.00000002.00000001.01000000.00000010.sdmp, EKU_Make_debug_v4.exe, 0000000E.00000002.2462550571.00000001401F4000.00000002.00000001.01000000.00000010.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://ocsp.thawte.com0VmjvNTbD5J.exe, 00000001.00000003.1702791021.00000229D4A49000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703106292.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703378095.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000002.00000003.1720428781.0000000009D9B000.00000004.00000001.00020000.00000000.sdmpfalse
                        high
                        http://www.maximumsoft.com/index_support.htmlgClickVmjvNTbD5J.exe, 00000001.00000003.1702791021.00000229D4A49000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000002.00000002.1727274131.0000000000B12000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000002.00000003.1720428781.0000000009D9B000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000000.1724311518.0000000000B12000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000002.2165962906.0000000000B12000.00000002.00000001.01000000.0000000A.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.vmware.com/0/WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://plerukilo0.site/I8yZEKU_Make_debug_v4.exe, 0000000A.00000003.2158291459.000000000048D000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2158447139.0000000000494000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0sVmjvNTbD5J.exe, 00000001.00000003.1702791021.00000229D4A49000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703106292.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000001.00000003.1703378095.00000229D4A30000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000002.00000003.1720428781.0000000009D9B000.00000004.00000001.00020000.00000000.sdmpfalse
                            high
                            http://www.softwareok.com/?seite=faq-Find.Same.Images.OK&faq=0EKU_Make_debug_v4.exe, 0000000A.00000002.2187738743.00000001401F4000.00000002.00000001.01000000.00000010.sdmp, EKU_Make_debug_v4.exe, 0000000E.00000002.2462550571.00000001401F4000.00000002.00000001.01000000.00000010.sdmpfalse
                              high
                              https://plerukilo0.site/EKU_Make_debug_v4.exe, 0000000A.00000003.2165775730.0000000000495000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2155393234.0000000000495000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2153993076.0000000000493000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2170891730.0000000000495000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000E.00000003.2449329946.0000000000548000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000E.00000002.2449720304.0000000000552000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://plerukilo0.site/proprietesSEKU_Make_debug_v4.exe, 0000000A.00000002.2172416660.0000000002D66000.00000004.00000001.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.???.xx/?search=%sWebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2187738743.00000001401E0000.00000002.00000001.01000000.00000010.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.symauth.com/cps0(WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://plerukilo0.site:443xEKU_Make_debug_v4.exe, 0000000A.00000003.2161959109.00000000004B1000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2161832944.00000000004AE000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2160051819.00000000004B1000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    http://www.maximumsoft.com/index_support.html7VmjvNTbD5J.exe, 00000001.00000003.1702791021.00000229D4A49000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000002.00000002.1727274131.0000000000B12000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000002.00000003.1720428781.0000000009D9B000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000000.1724311518.0000000000B12000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000002.2165962906.0000000000B12000.00000002.00000001.01000000.0000000A.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://plerukilo0.site/proprietesGHzEKU_Make_debug_v4.exe, 0000000A.00000002.2172416660.0000000002D66000.00000004.00000001.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://plerukilo0.site/dy~EKU_Make_debug_v4.exe, 0000000A.00000003.2163893352.000000000048D000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2162238370.0000000000494000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2161989373.000000000048D000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2164153156.0000000000494000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.maximumsoft.com/index_skins.htmlVmjvNTbD5J.exe, 00000001.00000003.1702791021.00000229D4A49000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000002.00000002.1727274131.0000000000B12000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000002.00000003.1720428781.0000000009D9B000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000000.1724311518.0000000000B12000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000002.2165962906.0000000000B12000.00000002.00000001.01000000.0000000A.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://plerukilo0.site/proprietesEKU_Make_debug_v4.exe, 0000000E.00000002.2450928590.0000000002D86000.00000004.00000001.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.symauth.com/rpa00WebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.maximumsoft.com/products/wc/tour_win_iet.htmWebCopier.exe, 00000002.00000000.1705010990.000000000078F000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000002.00000002.1726654133.000000000078F000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000003.00000000.1724090947.000000000078F000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 00000003.00000002.1786226646.000000000078F000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000000.2105602327.000000000078F000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000002.2165697554.000000000078F000.00000002.00000001.01000000.0000000A.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.info-zip.org/WebCopier.exe, 00000002.00000002.1733072531.000000000981B000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.0000000009753000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.0000000005421000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.00000000025F6000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096A3000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://www.youtube.com/watch?v=WebCopier.exe, 00000002.00000000.1705222146.000000000087D000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000003.00000000.1724311518.000000000087D000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000000.2105703835.000000000087D000.00000002.00000001.01000000.0000000A.sdmpfalse
                                          high
                                          https://plerukilo0.site/XyzEKU_Make_debug_v4.exe, 0000000A.00000003.2163893352.000000000048D000.00000004.00000020.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000003.2164153156.0000000000494000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.surfok.de/cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.maximumsoft.com/index_transl.htmlVmjvNTbD5J.exe, 00000001.00000003.1702791021.00000229D4A49000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000002.00000002.1727274131.0000000000B12000.00000002.00000001.01000000.00000007.sdmp, WebCopier.exe, 00000002.00000003.1720428781.0000000009D9B000.00000004.00000001.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000000.1724311518.0000000000B12000.00000002.00000001.01000000.0000000A.sdmp, WebCopier.exe, 0000000B.00000002.2165962906.0000000000B12000.00000002.00000001.01000000.0000000A.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://plerukilo0.site:4436NEKU_Make_debug_v4.exe, 0000000E.00000003.2448000505.000000000055E000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://wixtoolset.org/schemas/v4/2008/BurnpVmjvNTbD5J.exe, 00000000.00000003.1711503150.000002BC4EC58000.00000004.00000800.00020000.00000000.sdmp, VmjvNTbD5J.exe, 00000000.00000003.1711479523.000002BC4EC59000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.softwareok.comWebCopier.exe, 00000002.00000002.1733072531.0000000009871000.00000004.00000020.00020000.00000000.sdmp, WebCopier.exe, 00000003.00000002.1791149490.00000000097A9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.2060451900.000000000546A000.00000004.00000800.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2171655764.000000000263F000.00000004.00000001.00020000.00000000.sdmp, EKU_Make_debug_v4.exe, 0000000A.00000002.2187738743.00000001401E0000.00000002.00000001.01000000.00000010.sdmp, WebCopier.exe, 0000000B.00000002.2171490702.00000000096F9000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.2340538102.00000000051FA000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://appsyndication.org/2006/appsynVmjvNTbD5J.exefalse
                                                high
                                                No contacted IP infos
                                                Joe Sandbox version:42.0.0 Malachite
                                                Analysis ID:1586717
                                                Start date and time:2025-01-09 14:42:49 +01:00
                                                Joe Sandbox product:CloudBasic
                                                Overall analysis duration:0h 9m 18s
                                                Hypervisor based Inspection enabled:false
                                                Report type:full
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                Number of analysed new started processes analysed:16
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Sample name:VmjvNTbD5J.exe
                                                renamed because original name is a hash value
                                                Original Sample Name:8ed2ebe94abc2758e4db53c476f8b7a69b5436fe176cba112802990547c5bb24.exe
                                                Detection:MAL
                                                Classification:mal84.evad.winEXE@18/20@2/0
                                                EGA Information:
                                                • Successful, ratio: 80%
                                                HCA Information:
                                                • Successful, ratio: 78%
                                                • Number of executed functions: 63
                                                • Number of non-executed functions: 232
                                                Cookbook Comments:
                                                • Found application associated with file extension: .exe
                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                • Excluded IPs from analysis (whitelisted): 52.149.20.212, 13.107.253.45
                                                • Excluded domains from analysis (whitelisted): d.8.0.a.e.e.f.b.0.0.0.0.0.0.0.0.5.0.0.0.0.0.8.0.0.3.0.1.3.0.6.2.ip6.arpa, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                • Execution Graph export aborted for target WebCopier.exe, PID 5264 because there are no executed function
                                                • Not all processes where analyzed, report is missing behavior information
                                                • Report creation exceeded maximum time and may have missing disassembly code information.
                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                • VT rate limit hit for: VmjvNTbD5J.exe
                                                TimeTypeDescription
                                                08:43:43API Interceptor1x Sleep call for process: VmjvNTbD5J.exe modified
                                                08:44:20API Interceptor40x Sleep call for process: EKU_Make_debug_v4.exe modified
                                                08:44:36API Interceptor1x Sleep call for process: cmd.exe modified
                                                13:44:01AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BITA0F9.tmp
                                                13:44:14AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\writercloud_VMX_alpha.lnk
                                                No context
                                                No context
                                                No context
                                                No context
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exe8Rmoal0v85.exeGet hashmaliciousUnknownBrowse
                                                  cLm7ThwEvh.msiGet hashmaliciousUnknownBrowse
                                                    LVkAi4PBv6.exeGet hashmaliciousUnknownBrowse
                                                      w3245.exeGet hashmaliciousUnknownBrowse
                                                        w3245.exeGet hashmaliciousUnknownBrowse
                                                          9mauyKC3JW.exeGet hashmaliciousUnknownBrowse
                                                            ATLEQQXO.exeGet hashmaliciousUnknownBrowse
                                                              ATLEQQXO.exeGet hashmaliciousUnknownBrowse
                                                                upgrade.htaGet hashmaliciousDarkVision RatBrowse
                                                                  MiJZ3z4t5K.exeGet hashmaliciousUnknownBrowse
                                                                    Process:C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):5602086
                                                                    Entropy (8bit):7.7366034218979856
                                                                    Encrypted:false
                                                                    SSDEEP:98304:J4pkjdDUo6ETAjMOINsdAC3LA7ZoCgX87ku7bRFhDTR2kGG:aGpDaCcasLA7GCgI7bxDT4hG
                                                                    MD5:D5BFB4D12BB1EC3C6891F7E8A15464B1
                                                                    SHA1:985392881D104E29F7F3434F6930C4A4317FC4A6
                                                                    SHA-256:33DCBD4C2EA8A46E996DB8166F207C4660269AB3D0D828F5A7A9C2C02CDF0496
                                                                    SHA-512:955FD26A82FA398A92E2301F2EC8537523E67258BCC697122159A3E2A4E47BF75678F3F566E1304B9C3F8939FB51A1B31B9D831C3C00EF6AD324BC493FEEB8CC
                                                                    Malicious:false
                                                                    Preview:...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F../F.L~..Lz..Qc/..A5.kZ..d@".z]..yO4.-c#.xr..bI4.`]..yO4.x^F...F...F...F...F...F...F...F...F...F...F...F.bg(.yG'.dT#.u.F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F.bm4.lZ#.c]2.cM#...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F.Zg..D|c.@G%.b]).y...Yr..lC#.b\-...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F.?.v.8.q.:.F...F...F...F...F...F...F...F...F...F...F
                                                                    Process:C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):5602086
                                                                    Entropy (8bit):7.736603497926146
                                                                    Encrypted:false
                                                                    SSDEEP:98304:Q4pkjdDUo6ETAjMOINsdAC3LA7ZoCgX87ku7bRFhDTR2kGG:HGpDaCcasLA7GCgI7bxDT4hG
                                                                    MD5:3DC89E964F8EAA9B3AE9F63B9F8EB01E
                                                                    SHA1:03A9156A419D19DC89531AFB1CA7C932854D04A1
                                                                    SHA-256:941ECD8C83627CF0105B413ACE268726974511367AEC4830FAEEB381A11DD2C4
                                                                    SHA-512:BB72A1378E62C19BD0EEC5A01C3531E3D6F9E87697541F6991E9C49330346633A8F23854566CF42294B5D37E9D39930995DACD60DFAB4BDBA9F2780AB597A179
                                                                    Malicious:false
                                                                    Preview:...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F../F.L~..Lz..Qc/..A5.kZ..d@".z]..yO4.-c#.xr..bI4.`]..yO4.x^F...F...F...F...F...F...F...F...F...F...F...F.bg(.yG'.dT#.u.F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F.bm4.lZ#.c]2.cM#...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F.Zg..D|c.@G%.b]).y...Yr..lC#.b\-...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F...F.?.v.8.q.:.F...F...F...F...F...F...F...F...F...F...F
                                                                    Process:C:\Users\user\Desktop\VmjvNTbD5J.exe
                                                                    File Type:ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):732
                                                                    Entropy (8bit):5.433071609110206
                                                                    Encrypted:false
                                                                    SSDEEP:12:PKP7uXNULLWUz+8rXjTyXjBSRcP2EmRKp8ZyXjBSRcP2EWKpGyXjBSRcP2rRKpfV:PYYNwLLz+eXSXscP2wfXscP2MjXscP2O
                                                                    MD5:1BB365E03AB49C630AD7725274228680
                                                                    SHA1:3EC95BF7018723FF5876A317E6759199363CE8DF
                                                                    SHA-256:7B856D5E33CEB8CF3D6D131C1A0C5F517D3321F8B1C48219FB5690B5E02F0A69
                                                                    SHA-512:D4E6D2B60EA1175ADCB392FAC69040197C9C2C3122B74F3DB7ED6E7897AB7433AE687DB14ED255FD3225D1DB07071C3E717010435411DA93E77D927B14C280DB
                                                                    Malicious:false
                                                                    Preview:[18A0:1954][2025-01-09T08:43:41]i001: Burn x64 v4.0.0+8c757c0f67f26f21c6bcbbfb81b7ea8b91c35fe4, Windows v10.0 x64 (Build 19045: Service Pack 0), path: C:\Users\user\Desktop\VmjvNTbD5J.exe..[18A0:1954][2025-01-09T08:43:42]i009: Command Line: ''..[18A0:1954][2025-01-09T08:43:42]i000: Setting string variable 'WixBundleOriginalSource' to value 'C:\Users\user\Desktop\VmjvNTbD5J.exe'..[18A0:1954][2025-01-09T08:43:42]i000: Setting string variable 'WixBundleOriginalSourceFolder' to value 'C:\Users\user\Desktop\'..[18A0:1954][2025-01-09T08:43:42]i000: Setting string variable 'WixBundleLog' to value 'C:\Users\user\AppData\Local\Temp\Acupressure_20250109084342.cleanroom.log'..[18A0:1954][2025-01-09T08:43:43]i017: Exit code: 0x0..
                                                                    Process:C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exe
                                                                    File Type:ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):1122
                                                                    Entropy (8bit):5.480951674033435
                                                                    Encrypted:false
                                                                    SSDEEP:24:xX1YNwLLzEPXDzwXscP2wYUXscP2MNXscP2Ufe+UXscP2rXscP2EbUXscP2M:xONuEPYzcUz1zhexzwznbUzr
                                                                    MD5:6359C861662B4FB88165C33572C1CAE3
                                                                    SHA1:3F39210911264FA6221806CA74EFF5E09BECF387
                                                                    SHA-256:D33519B339488F5AD122FE939601DAC1EEF29157403DA08D693DD7A123E56F1C
                                                                    SHA-512:8C53FFAB4C520492989663A028706447778C8D793969D3FFB48A817CA11F10F9C3115BBA5C557CB3511904D6E226FEFB6405EA54AE6EC18330FCC134C3DE7CCF
                                                                    Malicious:false
                                                                    Preview:[1904:18F4][2025-01-09T08:43:42]i001: Burn x64 v4.0.0+8c757c0f67f26f21c6bcbbfb81b7ea8b91c35fe4, Windows v10.0 x64 (Build 19045: Service Pack 0), path: C:\Windows\TEMP\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exe..[1904:18F4][2025-01-09T08:43:42]i009: Command Line: '-burn.clean.room=C:\Users\user\Desktop\VmjvNTbD5J.exe -burn.filehandle.attached=564 -burn.filehandle.self=572'..[1904:18F4][2025-01-09T08:43:42]i000: Setting string variable 'WixBundleOriginalSource' to value 'C:\Users\user\Desktop\VmjvNTbD5J.exe'..[1904:18F4][2025-01-09T08:43:42]i000: Setting string variable 'WixBundleOriginalSourceFolder' to value 'C:\Users\user\Desktop\'..[1904:18F4][2025-01-09T08:43:42]i000: Setting string variable 'WixBundleLog' to value 'C:\Users\user\AppData\Local\Temp\Acupressure_20250109084342.log'..[1904:18F4][2025-01-09T08:43:42]i000: Setting string variable 'WixBundleInProgressName' to value ''..[1904:18F4][2025-01-09T08:43:42]i000: Setting string variable 'WixBundleName' to valu
                                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                                    File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):2364728
                                                                    Entropy (8bit):6.606009669324617
                                                                    Encrypted:false
                                                                    SSDEEP:49152:lbCT2kOGRpfJMi3kLRQrjYgeeZyTDwMHfDYZNBi:TkOKMiY0BZMHfDYZNBi
                                                                    MD5:967F4470627F823F4D7981E511C9824F
                                                                    SHA1:416501B096DF80DDC49F4144C3832CF2CADB9CB2
                                                                    SHA-256:B22BF1210B5FD173A210EBFA9092390AA0513C41E1914CBE161EB547F049EF91
                                                                    SHA-512:8883EAD428C9D4B415046DE9F8398AA1F65AE81FE7945A840C822620E18F6F9930CCE2E10ACFF3B5DA8B9C817ADE3DABC1DE576CBD255087267F77341900A41C
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Joe Sandbox View:
                                                                    • Filename: 8Rmoal0v85.exe, Detection: malicious, Browse
                                                                    • Filename: cLm7ThwEvh.msi, Detection: malicious, Browse
                                                                    • Filename: LVkAi4PBv6.exe, Detection: malicious, Browse
                                                                    • Filename: w3245.exe, Detection: malicious, Browse
                                                                    • Filename: w3245.exe, Detection: malicious, Browse
                                                                    • Filename: 9mauyKC3JW.exe, Detection: malicious, Browse
                                                                    • Filename: ATLEQQXO.exe, Detection: malicious, Browse
                                                                    • Filename: ATLEQQXO.exe, Detection: malicious, Browse
                                                                    • Filename: upgrade.hta, Detection: malicious, Browse
                                                                    • Filename: MiJZ3z4t5K.exe, Detection: malicious, Browse
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:<..To..To..To.:.o..To...o..To.:9o..To.:.o..To.:/o..To..Uoe.To...o|.To...o..To...o..To...o..ToRich..To................PE..d...^.?e..........#......H.....................@..............................%.....h.$.....................................................XW..,........q...p..$h....#.8)......................................(....................`...............................text...RG.......H.................. ..`.rdata..R/...`...0...L..............@..@.data................|..............@....pdata..$h...p...j..................@..@Shared...............p..............@....tls.................x..............@....rsrc....q.......r...z..............@..@................................................................................................................................................................................................................
                                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Jan 9 12:43:44 2025, mtime=Thu Jan 9 12:43:45 2025, atime=Sat Dec 28 18:23:52 2024, length=7579704, window=hide
                                                                    Category:dropped
                                                                    Size (bytes):936
                                                                    Entropy (8bit):5.022295924799116
                                                                    Encrypted:false
                                                                    SSDEEP:12:8ubhH5l1s4N6SWCyuLlddY//Au09SLAWq0NiljEjATmrHU5JICIBGBmV:8SHLXNGI+IqQ0wUAySLTBm
                                                                    MD5:B18A89211E70D7DB6A21AD0A9D2CE13B
                                                                    SHA1:025634109B1C04946A64C62D2AE6F167D07B16EA
                                                                    SHA-256:38ABE947BBC0121971A5705DE9E86A887D16A302ADD01C1A632FEE35353C74EA
                                                                    SHA-512:58832DEAA45E860BC0869707324170F9AF8D2CA980737BE9B1D650979E97B6C5B0D08251D0BDE4E699C98FB287994D1A7E9D666D455460EB8CBF9FA32CBB7F3E
                                                                    Malicious:false
                                                                    Preview:L..................F.... .....a..b..4t...b....0.^Y..8.s.......................:..DG..Yr?.D..U..k0.&...&......vk.v......az.b......b......t...CFSF..1.....CW.^..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......CW.^)Ztm...........................%..A.p.p.D.a.t.a...B.V.1.....)Zwm..Roaming.@......CW.^)Zwm..........................F?..R.o.a.m.i.n.g.....l.1.....)Zwm..CHROME~1..T......)Zwm)Zwm...........................T..C.h.r.o.m.e.Q.u.i.c.k._.D.V.B.v.5.....h.2.8.s..Y.. .WEBCOP~1.EXE..L......)Zwm)Zwm....")........................W.e.b.C.o.p.i.e.r...e.x.e.......m...............-.......l............R......C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exe..-.....\.....\.R.o.a.m.i.n.g.\.C.h.r.o.m.e.Q.u.i.c.k._.D.V.B.v.5.\.W.e.b.C.o.p.i.e.r...e.x.e.`.......X.......899552...........hT..CrF.f4... ...T..b...,.......hT..CrF.f4... ...T..b...,......E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                                    File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):2505728
                                                                    Entropy (8bit):6.683714555081184
                                                                    Encrypted:false
                                                                    SSDEEP:49152:QW0DiTqAgRUKAMG3qA+W65WZTN4hS2EDUrkaV4RQGSKqBfV7m3Y2hIm9RGSQX100:JipWZ2qRcBT
                                                                    MD5:B596AF2DE1506E0C2BD760A8E3D60479
                                                                    SHA1:0F241562F68D07CCC6600844272096806AB35CEE
                                                                    SHA-256:B7177B171BD935890D0493CEC143EE900D4AF3B8C57EAC0AA1E99C82ABFD966B
                                                                    SHA-512:8ADCABD698F9A6D5C03C7DC2FBB7788391CCD63F3B4A4254ED3F9857499BC8E741B5FBEA77B53106B8EA69F2506FD9892721CB80442FFEFA5351A0C323C0494C
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...Q.@Q.................. .. &..x..W..........@.............................00.......&...`... .............................................../......./.8....`%.lu............0..............................W%.(...................x./..............................text..... ....... .................`..`.data......... ....... .............@....rdata........!.......!.............@..@.pdata..lu...`%..v...F%.............@..@.xdata..0W....%..X....%.............@..@.bss.....w...@&..........................idata......../.......&.............@....CRT....0...../.......&.............@....tls........../.......&.............@....rsrc...8...../.......&.............@..@.reloc........0...... &.............@..Bepj...... ....0......$&.............@...................................................................................................................................
                                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                                    File Type:Unknown
                                                                    Category:dropped
                                                                    Size (bytes):2505728
                                                                    Entropy (8bit):6.683714555081184
                                                                    Encrypted:false
                                                                    SSDEEP:49152:QW0DiTqAgRUKAMG3qA+W65WZTN4hS2EDUrkaV4RQGSKqBfV7m3Y2hIm9RGSQX100:JipWZ2qRcBT
                                                                    MD5:B596AF2DE1506E0C2BD760A8E3D60479
                                                                    SHA1:0F241562F68D07CCC6600844272096806AB35CEE
                                                                    SHA-256:B7177B171BD935890D0493CEC143EE900D4AF3B8C57EAC0AA1E99C82ABFD966B
                                                                    SHA-512:8ADCABD698F9A6D5C03C7DC2FBB7788391CCD63F3B4A4254ED3F9857499BC8E741B5FBEA77B53106B8EA69F2506FD9892721CB80442FFEFA5351A0C323C0494C
                                                                    Malicious:false
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...Q.@Q.................. .. &..x..W..........@.............................00.......&...`... .............................................../......./.8....`%.lu............0..............................W%.(...................x./..............................text..... ....... .................`..`.data......... ....... .............@....rdata........!.......!.............@..@.pdata..lu...`%..v...F%.............@..@.xdata..0W....%..X....%.............@..@.bss.....w...@&..........................idata......../.......&.............@....CRT....0...../.......&.............@....tls........../.......&.............@....rsrc...8...../.......&.............@..@.reloc........0...... &.............@..Bepj...... ....0......$&.............@...................................................................................................................................
                                                                    Process:C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exe
                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):184320
                                                                    Entropy (8bit):6.351681914669155
                                                                    Encrypted:false
                                                                    SSDEEP:3072:oO4+0LodFt+wsxMl1NqAc5iSttkClFelrl+AMVaKoXA1OaYe:oO4xMdFowsxizqyStZlFel5npA1OaF
                                                                    MD5:FA05AB4DD4914384F5FB35D33BC73A0F
                                                                    SHA1:0309F593ADCD0673919269D8DC40F95081D103D4
                                                                    SHA-256:3F8CE1047167F498734B88C959CF4FF89622C8229C89B6A3333D3BC3823F85B3
                                                                    SHA-512:CCCE1623AC2EA29E66778C2C1B76DB2320F488548F353B04F65E03BA5AEFC3BA150E61C729ED112747BA969BE6DDA601EA3292DDB43F378C7C708E3C45E0A5FD
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 43%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........C.R.-.R.-.R.-.).!.T.-..#.K.-.'..-.'.Y.-.0.>.W.-.R.,.:.-.&.q.-.).S.-.RichR.-.........................PE..L.....GL...........!................ZR...............................................................................P.......F..<....................................................................................................................text............................... ..`.rdata...S.......`..................@..@.data...|J...p...0...p..............@....reloc...-.......0..................@..B................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):7579704
                                                                    Entropy (8bit):6.84709467393535
                                                                    Encrypted:false
                                                                    SSDEEP:196608:ykxa78pklLylqrJ6CkamuqW5A1eMoxFLOyomFHKnPH:+gW5oSF+
                                                                    MD5:E2A27870BA4DA90DF6276C4DA9E3CF82
                                                                    SHA1:CD0A17F6DDC7B4994D98F26848C3A2D7DAE74E68
                                                                    SHA-256:9F1BB79EF7D76E5DDDC628D0455C1F6A6AA068CC210F1D238A231F77AC9CBBA2
                                                                    SHA-512:66C4D8D1C6CB45A6C10CBB16D4388858980E7BC4F57FB88DC2A3B7B8FC6DA82DBA3E9B1BFD33EA4C25A7AFD5612C2823915E5F0759728CCCFE81BD4F99AFC235
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...................................8...........!..L.!This program cannot be run in DOS mode....$.......D...............e.."...e........-.....e....e......e..&.....i........"...............................................t......t.Q.......9.....t......Rich....................PE..L...O..^..................8...;.......,.......8...@.......................... t.......t.....................................l#F.......G.(F,...........s.8.............?.T.....................?.......>.@.............8.X.....F.@....................text.....8.......8................. ..`.rdata..p.....8.......8.............@..@.data....@....F......bF.............@....rsrc...(F,...G..H,..BG.............@..@........................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):4469405
                                                                    Entropy (8bit):7.95660152908976
                                                                    Encrypted:false
                                                                    SSDEEP:98304:IVvV7XPZLI6LoL6XWx44ibjVD4CBDLAJ32NSCU3pjug7iw:IVQ6kL6G23VD4CBDw3LCUZjuIiw
                                                                    MD5:772D57BC0AB0B82F3C35990EA58AABC2
                                                                    SHA1:DDA21EA8FF8468122E09271FB915F0BAB9ACF544
                                                                    SHA-256:60E662EF1ED6AC0FC757D9402AB859A7ED45F91A7183355B4464A60759A440C1
                                                                    SHA-512:5A50D936CB2CF9809F0F88A3A166EBA6C645B54B0C2A28BB1B64B1EA058EC30FA55FA7EE9D41B3832B23994A35C3C9F60DAC669AF1E898219C53DDC4C47E72CD
                                                                    Malicious:false
                                                                    Preview:.pM.e........Hl.......ic`D....s.V..F..pG....vQ......j..[e...Pa...L...H..rXnP.....Sm...ndn....j..nWTvu.f..k.Q..Gt.OK..QT.tIV.JN...j..nZ.SBq.\L.a..C..l..r....W.D.MG.p..`mjrxsXxoT.Fq.g.xp...]..fj..F.K...^.MGj.prl..P....d...H..\YtJ.c.......c.li..e....k...EGw...N...Fu...at].p.....xj.R.K.ENc.q^._.HPQY[D.a..L..Rq.DaW.W.o..wW.YV..BO..PI.._..fv....rV.E.w.H.cWSN.SL.Wm..a.Gw.i.B.v..p_p.hK..BPR..ff.xOE..D_..l.m..Gd.J...V..X....v_.Sy.aj`DY..._....b\Ic.Zm.aalks..ILvZ]...._Y.x..Ttn.Pd..nYDW.jp...nH_\`.id.roy......d...PRN^re..._...gWFq_..P....LKe.]C.e..bGpk.u..wH...s.ed^..]._b.\._Y...bcZKZ.E....R..Ql.HryH.W..M.Qa....PWS..LQNFBX.m..U..x.Cb.w.V...Y.s.`.N..UE.GHnj._OSi.Q.r]ummdc.`.S.j^.w..jC..W.......Ncc..lHU.......F.oQI.E.....h...[.NuC[G....._.ZxZ..D...C..d.Ybh.l].JL...VK..E...vy.cXOl.c...Pk..d.[..Dq....bw..BSR_c.Xw.m.H._X^.Y.b...Ba..Q..chjwNR`a..\S.....bj[MX[.x.A.......C.`b^_..XIo.\..oDl....hp_tqqV..C....w.ee...^nD.].Fn.W.d..R...PMWQi.ci..p..b..g..P.Y.g..w_cYy.F.c....xy...w.l..j.XI]....X.W.k...[HcMw...
                                                                    Process:C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):43077
                                                                    Entropy (8bit):4.745006147010959
                                                                    Encrypted:false
                                                                    SSDEEP:768:AjAlxcFjdt7p5LtbCiDFf9Am4ysG4z+w5KKMX9PLDjn:Pxg7fLtbh8IcE9PLDjn
                                                                    MD5:33D9C73A5F1B9C5B16E9FF892F24A05A
                                                                    SHA1:7DC1DF26FF605549E50F2DBD8BB69C179E7A6B3C
                                                                    SHA-256:030D40902ED53B64F03B4FD91D1ED4B931140F155DFF02E058D93F019F43D2DB
                                                                    SHA-512:19F857CBF4010172EC5E83F0B0AFE50798CE61663ABE0CE19C8098F6B9CA930026FB3BC8161A812265A64F38CC2BB144CAEFD154701FFFB8F808BB4649F2B0FA
                                                                    Malicious:false
                                                                    Preview:D...V^..j..a.E..QE...qAa.UTBT.Ef.e....\.q.SlK..rZ[ywW^...]AI.G.`.JRoZaKQ.....n..LT.SNugG...\.I.na.AGaY.d.E.H.l.y.....j`..o.VqtY......n..Y.eQT..vY......m.E.Ax.q.._v..UuT..yVT.K...rf.hlO...q...t..nH...b.lZv..Qm.Hyj...L...[.[a.a.j.s.J.q.xo...t.....O.dNN....S.j.lwE..A..n[....y..V...U.J.H.HfP..W_B.o..jUwB.d......C].OO....tZ...fSaQi...Ensbi..XW.......M...I..\q.Z.........FY...GE.J[._kXGb[..f...ID.Ha..qc.G...i...D..].PHbH..K.V.DboPR.ny_kF.R\R.gl`.f.k.Wr.WR.WP..U.N.p..Ss.]D..s.k....ZA......i.Y.NKQk.Kc..L..Y.P.ej......].......Ht..nC..U.XN.m.I.....C...F.ZXSQ..D.bGB_.w.o.\BaKD.j...Vwy....`...p...]OV.Yt..HX.D`.vA..NM..F.D.U...X.p..KYku.\.K.sGbK...i.s...a...Yl.......C[...H.cr.H.Ygc..Zl.t..d_.y......SrMvC..XtW.hJ..jD....f...T......xRsT......g.n...X..C..Q.m.oqe.a..kZ.qDBAD...i.`C.o[.C..^e.V.NM..N.nvc.yb....Gq..._Y....g.ZN...q..jvY.ysV....Cf_B.....e.H.L.n[A.L.`.Lr.WBgaAW.\\H.Khy.VE.Ku..[...dCU...Z....TD...o..c.E..`.b..L.B..Xp....s..Y.U..ZpO..Bm.sVk.Vt.g...oM.SkuL.rX.l.LU....\..d....xR.yw..N.....F.td...
                                                                    Process:C:\Users\user\Desktop\VmjvNTbD5J.exe
                                                                    File Type:PE32+ executable (GUI) x86-64, for MS Windows, InstallShield self-extracting archive
                                                                    Category:dropped
                                                                    Size (bytes):7814631
                                                                    Entropy (8bit):7.965065406976698
                                                                    Encrypted:false
                                                                    SSDEEP:196608:f/udXsI8lAWZkhDIIUctmEFpnr8Kxdw3+Q:fKX1+A2khsctmEFJrbjQ
                                                                    MD5:B153C388223577EA044ACA3908BE2935
                                                                    SHA1:B7DCD73611D5C85871E6191E32A90E465654D1A2
                                                                    SHA-256:12880838FDFB4C1AF193AC963CE4B6019051545B201F303884BF1711172E275B
                                                                    SHA-512:F53D25B761B7EB7B73B0F0E39F36FAA042DBFDEB0FAAA65E2E17C473B7B1B4E486619735E0193904A1255C4E7C7F5892BDC0D8D934F55D07B8E6A45BCFF8E253
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 58%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......R.>..eP..eP..eP.].S..eP.].U.eP.Y.T..eP.Y.S..eP.Y.U.;eP..U.BeP.].T..eP.].V..eP.].Q..eP..eQ.sdP...U..eP......eP..e...eP...R..eP.Rich.eP.........PE..d....p-d.........."....".............=.........@..........................................`.................................................P6..........(P......HE...........p......p...T.......................(...p...@...............(....0.. ....................text............................... ..`.rdata...b.......d..................@..@.data...."...`.......F..............@....pdata..HE.......F...R..............@..@.didat..............................@....wixburn0...........................@..@_RDATA..\...........................@..@.rsrc...(P.......R..................@..@.reloc.......p......................@..B........................................................................................................
                                                                    Process:C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exe
                                                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (578), with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):2654
                                                                    Entropy (8bit):3.743876977740129
                                                                    Encrypted:false
                                                                    SSDEEP:48:y+03N6hOfgFLvkwcne1+ercuCuqatMJD0wfycJeGgDrG9i1yr9Xi1s5rIl:72wcn6+ercuLqka0wfyci29Wyr9XWs5C
                                                                    MD5:B0938047D6FB88200838F89D36146D54
                                                                    SHA1:2D0ADCAE671D73DC03E23683BA070E62C8093511
                                                                    SHA-256:DECFE73B2CB6176156EA0C67F39DE7919E68EFE9B8AF00E658F32CDBBC11BA57
                                                                    SHA-512:0CFAEE19111763764585EC82EAA4C5722730F56B231FDE0F3467BDA1288DE13B607A9715E1A6EA9B3833CABFFAC98794BB0EB6126A3F1E524802D45882829DBD
                                                                    Malicious:false
                                                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".u.t.f.-.1.6.".?.>.....<.B.o.o.t.s.t.r.a.p.p.e.r.A.p.p.l.i.c.a.t.i.o.n.D.a.t.a. .x.m.l.n.s.=.".h.t.t.p.:././.w.i.x.t.o.o.l.s.e.t...o.r.g./.s.c.h.e.m.a.s./.v.4./.B.o.o.t.s.t.r.a.p.p.e.r.A.p.p.l.i.c.a.t.i.o.n.D.a.t.a.".>..... . .<.W.i.x.B.u.n.d.l.e.P.r.o.p.e.r.t.i.e.s. .D.i.s.p.l.a.y.N.a.m.e.=.".A.c.u.p.r.e.s.s.u.r.e.". .L.o.g.P.a.t.h.V.a.r.i.a.b.l.e.=.".W.i.x.B.u.n.d.l.e.L.o.g.". .C.o.m.p.r.e.s.s.e.d.=.".n.o.". .I.d.=.".{.8.2.E.A.A.5.A.E.-.9.3.D.4.-.4.0.C.8.-.9.E.8.5.-.B.6.3.9.0.9.B.1.3.F.1.2.}.". .U.p.g.r.a.d.e.C.o.d.e.=.".{.A.1.0.4.0.0.3.A.-.1.4.2.B.-.4.D.0.9.-.8.5.8.E.-.F.3.4.2.F.2.0.5.8.3.A.2.}.". .P.e.r.M.a.c.h.i.n.e.=.".y.e.s.". ./.>..... . .<.W.i.x.R.o.l.l.b.a.c.k.B.o.u.n.d.a.r.y. .I.d.=.".W.i.x.D.e.f.a.u.l.t.B.o.u.n.d.a.r.y.". .V.i.t.a.l.=.".y.e.s.". .T.r.a.n.s.a.c.t.i.o.n.=.".n.o.". ./.>..... . .<.W.i.x.P.a.c.k.a.g.e.P.r.o.p.e.r.t.i.e.s. .P.a.c.k.a.g.e.=.".U.r.o.s.c.o.p.y.". .V.i.t.a.l.=.".y.e.s.". .D.i.s.p.l.a.y.N.a.
                                                                    Process:C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exe
                                                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):252
                                                                    Entropy (8bit):3.50802487441866
                                                                    Encrypted:false
                                                                    SSDEEP:6:QFulcLk0YR5Ie8GcUlLulFwENeWlYmH1fMWGVUlLulFwEnk:QF/LXYRWe8OLqF3Ye1kWGaLqFhk
                                                                    MD5:A35990570AFAA7D023FD2EBBE229AFB8
                                                                    SHA1:86688B13D3364ADB90BBA552F544D4D546AFD63D
                                                                    SHA-256:9B696AD0EC3B37BAC11DA76BCD51AD907D31EE9638DAD7BB8FDD5AEF919EF621
                                                                    SHA-512:1845B25697FED6D694428F53B2D1B2ABF1ACF8A09E8E49A536759822AD5B1A75D51BC7AE4D73E435B7BBC23AC34C9AED76F17414D218B54DA546C908F9A5182C
                                                                    Malicious:false
                                                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".u.t.f.-.1.6.".?.>.....<.B.u.n.d.l.e.E.x.t.e.n.s.i.o.n.D.a.t.a. .x.m.l.n.s.=.".h.t.t.p.:././.w.i.x.t.o.o.l.s.e.t...o.r.g./.s.c.h.e.m.a.s./.v.4./.B.u.n.d.l.e.E.x.t.e.n.s.i.o.n.D.a.t.a.". ./.>.
                                                                    Process:C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exe
                                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):39048
                                                                    Entropy (8bit):6.308071188599813
                                                                    Encrypted:false
                                                                    SSDEEP:768:6FtuUXVquBaZxkBfy4jwG9DQ6xnXmzxaRAzGIILnv:6qMckBfld9LnIxXzaLv
                                                                    MD5:4C87D6BAF09AC581EA54394E3F38B9E8
                                                                    SHA1:A24503B11068369A83D0E90CAC02B67B5C99958C
                                                                    SHA-256:2F49C1D5A31D345760EF393D6A2E7AF8987ED31FECE4ABB72B16ED22F3DFDA7F
                                                                    SHA-512:26143AB73DB50755CF62E15D229E8F257ECF54B9A6BF1F89F516A5995961DAA46045ACECEC7D521593198A365F9E21E34E41403FACC43DE7E533BFEC0CEA43A0
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........JY..+7..+7..+7..L..+7..S...+7..S...+7..S...+7..+6.d+7..S...+7..Z..+7..S...+7..S...+7...I..+7..S...+7..S...+7.Rich.+7.................PE..d..../*P.........." .....h...........O.........p..........................................@..........................................w..i....n.......................|..........j... ................................................................................text....g.......h.................. ..`.data...@............l..............@....pdata...............r..............@..@.rsrc................v..............@..@.reloc...............z..............@..B................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exe
                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):184320
                                                                    Entropy (8bit):6.351681914669155
                                                                    Encrypted:false
                                                                    SSDEEP:3072:oO4+0LodFt+wsxMl1NqAc5iSttkClFelrl+AMVaKoXA1OaYe:oO4xMdFowsxizqyStZlFel5npA1OaF
                                                                    MD5:FA05AB4DD4914384F5FB35D33BC73A0F
                                                                    SHA1:0309F593ADCD0673919269D8DC40F95081D103D4
                                                                    SHA-256:3F8CE1047167F498734B88C959CF4FF89622C8229C89B6A3333D3BC3823F85B3
                                                                    SHA-512:CCCE1623AC2EA29E66778C2C1B76DB2320F488548F353B04F65E03BA5AEFC3BA150E61C729ED112747BA969BE6DDA601EA3292DDB43F378C7C708E3C45E0A5FD
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 43%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........C.R.-.R.-.R.-.).!.T.-..#.K.-.'..-.'.Y.-.0.>.W.-.R.,.:.-.&.q.-.).S.-.RichR.-.........................PE..L.....GL...........!................ZR...............................................................................P.......F..<....................................................................................................................text............................... ..`.rdata...S.......`..................@..@.data...|J...p...0...p..............@....reloc...-.......0..................@..B................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):7579704
                                                                    Entropy (8bit):6.84709467393535
                                                                    Encrypted:false
                                                                    SSDEEP:196608:ykxa78pklLylqrJ6CkamuqW5A1eMoxFLOyomFHKnPH:+gW5oSF+
                                                                    MD5:E2A27870BA4DA90DF6276C4DA9E3CF82
                                                                    SHA1:CD0A17F6DDC7B4994D98F26848C3A2D7DAE74E68
                                                                    SHA-256:9F1BB79EF7D76E5DDDC628D0455C1F6A6AA068CC210F1D238A231F77AC9CBBA2
                                                                    SHA-512:66C4D8D1C6CB45A6C10CBB16D4388858980E7BC4F57FB88DC2A3B7B8FC6DA82DBA3E9B1BFD33EA4C25A7AFD5612C2823915E5F0759728CCCFE81BD4F99AFC235
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...................................8...........!..L.!This program cannot be run in DOS mode....$.......D...............e.."...e........-.....e....e......e..&.....i........"...............................................t......t.Q.......9.....t......Rich....................PE..L...O..^..................8...;.......,.......8...@.......................... t.......t.....................................l#F.......G.(F,...........s.8.............?.T.....................?.......>.@.............8.X.....F.@....................text.....8.......8................. ..`.rdata..p.....8.......8.............@..@.data....@....F......bF.............@....rsrc...(F,...G..H,..BG.............@..@........................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):4469405
                                                                    Entropy (8bit):7.95660152908976
                                                                    Encrypted:false
                                                                    SSDEEP:98304:IVvV7XPZLI6LoL6XWx44ibjVD4CBDLAJ32NSCU3pjug7iw:IVQ6kL6G23VD4CBDw3LCUZjuIiw
                                                                    MD5:772D57BC0AB0B82F3C35990EA58AABC2
                                                                    SHA1:DDA21EA8FF8468122E09271FB915F0BAB9ACF544
                                                                    SHA-256:60E662EF1ED6AC0FC757D9402AB859A7ED45F91A7183355B4464A60759A440C1
                                                                    SHA-512:5A50D936CB2CF9809F0F88A3A166EBA6C645B54B0C2A28BB1B64B1EA058EC30FA55FA7EE9D41B3832B23994A35C3C9F60DAC669AF1E898219C53DDC4C47E72CD
                                                                    Malicious:false
                                                                    Preview:.pM.e........Hl.......ic`D....s.V..F..pG....vQ......j..[e...Pa...L...H..rXnP.....Sm...ndn....j..nWTvu.f..k.Q..Gt.OK..QT.tIV.JN...j..nZ.SBq.\L.a..C..l..r....W.D.MG.p..`mjrxsXxoT.Fq.g.xp...]..fj..F.K...^.MGj.prl..P....d...H..\YtJ.c.......c.li..e....k...EGw...N...Fu...at].p.....xj.R.K.ENc.q^._.HPQY[D.a..L..Rq.DaW.W.o..wW.YV..BO..PI.._..fv....rV.E.w.H.cWSN.SL.Wm..a.Gw.i.B.v..p_p.hK..BPR..ff.xOE..D_..l.m..Gd.J...V..X....v_.Sy.aj`DY..._....b\Ic.Zm.aalks..ILvZ]...._Y.x..Ttn.Pd..nYDW.jp...nH_\`.id.roy......d...PRN^re..._...gWFq_..P....LKe.]C.e..bGpk.u..wH...s.ed^..]._b.\._Y...bcZKZ.E....R..Ql.HryH.W..M.Qa....PWS..LQNFBX.m..U..x.Cb.w.V...Y.s.`.N..UE.GHnj._OSi.Q.r]ummdc.`.S.j^.w..jC..W.......Ncc..lHU.......F.oQI.E.....h...[.NuC[G....._.ZxZ..D...C..d.Ybh.l].JL...VK..E...vy.cXOl.c...Pk..d.[..Dq....bw..BSR_c.Xw.m.H._X^.Y.b...Ba..Q..chjwNR`a..\S.....bj[MX[.x.A.......C.`b^_..XIo.\..oDl....hp_tqqV..C....w.ee...^nD.].Fn.W.d..R...PMWQi.ci..p..b..g..P.Y.g..w_cYy.F.c....xy...w.l..j.XI]....X.W.k...[HcMw...
                                                                    Process:C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):43077
                                                                    Entropy (8bit):4.745006147010959
                                                                    Encrypted:false
                                                                    SSDEEP:768:AjAlxcFjdt7p5LtbCiDFf9Am4ysG4z+w5KKMX9PLDjn:Pxg7fLtbh8IcE9PLDjn
                                                                    MD5:33D9C73A5F1B9C5B16E9FF892F24A05A
                                                                    SHA1:7DC1DF26FF605549E50F2DBD8BB69C179E7A6B3C
                                                                    SHA-256:030D40902ED53B64F03B4FD91D1ED4B931140F155DFF02E058D93F019F43D2DB
                                                                    SHA-512:19F857CBF4010172EC5E83F0B0AFE50798CE61663ABE0CE19C8098F6B9CA930026FB3BC8161A812265A64F38CC2BB144CAEFD154701FFFB8F808BB4649F2B0FA
                                                                    Malicious:false
                                                                    Preview:D...V^..j..a.E..QE...qAa.UTBT.Ef.e....\.q.SlK..rZ[ywW^...]AI.G.`.JRoZaKQ.....n..LT.SNugG...\.I.na.AGaY.d.E.H.l.y.....j`..o.VqtY......n..Y.eQT..vY......m.E.Ax.q.._v..UuT..yVT.K...rf.hlO...q...t..nH...b.lZv..Qm.Hyj...L...[.[a.a.j.s.J.q.xo...t.....O.dNN....S.j.lwE..A..n[....y..V...U.J.H.HfP..W_B.o..jUwB.d......C].OO....tZ...fSaQi...Ensbi..XW.......M...I..\q.Z.........FY...GE.J[._kXGb[..f...ID.Ha..qc.G...i...D..].PHbH..K.V.DboPR.ny_kF.R\R.gl`.f.k.Wr.WR.WP..U.N.p..Ss.]D..s.k....ZA......i.Y.NKQk.Kc..L..Y.P.ej......].......Ht..nC..U.XN.m.I.....C...F.ZXSQ..D.bGB_.w.o.\BaKD.j...Vwy....`...p...]OV.Yt..HX.D`.vA..NM..F.D.U...X.p..KYku.\.K.sGbK...i.s...a...Yl.......C[...H.cr.H.Ygc..Zl.t..d_.y......SrMvC..XtW.hJ..jD....f...T......xRsT......g.n...X..C..Q.m.oqe.a..kZ.qDBAD...i.`C.o[.C..^e.V.NM..N.nvc.yb....Gq..._Y....g.ZN...q..jvY.ysV....Cf_B.....e.H.L.n[A.L.`.Lr.WBgaAW.\\H.Khy.VE.Ku..[...dCU...Z....TD...o..c.E..`.b..L.B..Xp....s..Y.U..ZpO..Bm.sVk.Vt.g...oM.SkuL.rX.l.LU....\..d....xR.yw..N.....F.td...
                                                                    File type:PE32+ executable (GUI) x86-64, for MS Windows, InstallShield self-extracting archive
                                                                    Entropy (8bit):7.9655777882955725
                                                                    TrID:
                                                                    • Win64 Executable (generic) (12005/4) 74.95%
                                                                    • Generic Win/DOS Executable (2004/3) 12.51%
                                                                    • DOS Executable Generic (2002/1) 12.50%
                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
                                                                    File name:VmjvNTbD5J.exe
                                                                    File size:7'884'295 bytes
                                                                    MD5:ab660c89d26121d4041874614646fd75
                                                                    SHA1:586cb1d772f7f559786f4f5b2420e5ba5806815b
                                                                    SHA256:8ed2ebe94abc2758e4db53c476f8b7a69b5436fe176cba112802990547c5bb24
                                                                    SHA512:bb5a761372d9a7301d8f37545e092d0ee8843472e77ec919adb9084ec2b1142e9faaa2dfa7f563ffa568df4b463dcc1c444f50b1b8413c40a3214474aeebd38b
                                                                    SSDEEP:196608:f/udXsI8lAWZkhDIIUctmEFpnr8Kxdw3+3:fKX1+A2khsctmEFJrbj3
                                                                    TLSH:5A8622763BF424FAC4BA4376C6808272FE75B14D3321647D8AA4962C1F7B96965BF300
                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......R.>..eP..eP..eP.].S..eP.].U..eP.Y.T..eP.Y.S..eP.Y.U.;eP...U.BeP.].T..eP.].V..eP.].Q..eP..eQ.sdP...U..eP......eP..e...eP...R..eP
                                                                    Icon Hash:2d2e3797b32b2b99
                                                                    Entrypoint:0x140053dd0
                                                                    Entrypoint Section:.text
                                                                    Digitally signed:false
                                                                    Imagebase:0x140000000
                                                                    Subsystem:windows gui
                                                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, REMOVABLE_RUN_FROM_SWAP, NET_RUN_FROM_SWAP
                                                                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                                                    Time Stamp:0x642D70FD [Wed Apr 5 13:00:45 2023 UTC]
                                                                    TLS Callbacks:
                                                                    CLR (.Net) Version:
                                                                    OS Version Major:6
                                                                    OS Version Minor:0
                                                                    File Version Major:6
                                                                    File Version Minor:0
                                                                    Subsystem Version Major:6
                                                                    Subsystem Version Minor:0
                                                                    Import Hash:07c4dc6e132c507bcef10998173e3c81
                                                                    Instruction
                                                                    dec eax
                                                                    sub esp, 28h
                                                                    call 00007F0C290A87C4h
                                                                    dec eax
                                                                    add esp, 28h
                                                                    jmp 00007F0C290A825Fh
                                                                    int3
                                                                    int3
                                                                    inc eax
                                                                    push ebx
                                                                    dec eax
                                                                    sub esp, 20h
                                                                    dec eax
                                                                    mov ebx, ecx
                                                                    xor ecx, ecx
                                                                    call dword ptr [0002B4D3h]
                                                                    dec eax
                                                                    mov ecx, ebx
                                                                    call dword ptr [0002B4C2h]
                                                                    call dword ptr [0002B63Ch]
                                                                    dec eax
                                                                    mov ecx, eax
                                                                    mov edx, C0000409h
                                                                    dec eax
                                                                    add esp, 20h
                                                                    pop ebx
                                                                    dec eax
                                                                    jmp dword ptr [0002B4B8h]
                                                                    int3
                                                                    int3
                                                                    int3
                                                                    int3
                                                                    int3
                                                                    int3
                                                                    int3
                                                                    int3
                                                                    dec eax
                                                                    mov dword ptr [esp+08h], ecx
                                                                    dec eax
                                                                    sub esp, 38h
                                                                    mov ecx, 00000017h
                                                                    call dword ptr [0002B4A4h]
                                                                    test eax, eax
                                                                    je 00007F0C290A83E9h
                                                                    mov ecx, 00000002h
                                                                    int 29h
                                                                    dec eax
                                                                    lea ecx, dword ptr [00062E4Ah]
                                                                    call 00007F0C290A848Eh
                                                                    dec eax
                                                                    mov eax, dword ptr [esp+38h]
                                                                    dec eax
                                                                    mov dword ptr [00062F31h], eax
                                                                    dec eax
                                                                    lea eax, dword ptr [esp+38h]
                                                                    dec eax
                                                                    add eax, 08h
                                                                    dec eax
                                                                    mov dword ptr [00062EC1h], eax
                                                                    dec eax
                                                                    mov eax, dword ptr [00062F1Ah]
                                                                    dec eax
                                                                    mov dword ptr [00062D8Bh], eax
                                                                    dec eax
                                                                    mov eax, dword ptr [esp+40h]
                                                                    dec eax
                                                                    mov dword ptr [00062E8Fh], eax
                                                                    mov dword ptr [00062D65h], C0000409h
                                                                    mov dword ptr [00062D5Fh], 00000001h
                                                                    mov dword ptr [00000069h], 00000000h
                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xb36500xb4.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xc10000x5028.rsrc
                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0xb90000x4548.pdata
                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xc70000x788.reloc
                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0xaf2700x54.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_TLS0xaf3000x28.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xaee700x140.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x7f0000x828.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0xb300c0x120.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                    .text0x10000x7dce00x7de00c704ae162ee75093c868d807de4e6109False0.513908499875869data6.395321923761475IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                    .rdata0x7f0000x362060x36400fe6ad98a384b001707cdb378131283ecFalse0.28707337269585254data5.143926566262762IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    .data0xb60000x22d00xc00ba85cbd0519f80f728e08c1ca076f497False0.16731770833333334Matlab v4 mat-file (little endian) f\324\377\3772\242\337-\231+, sparse, rows 0, columns 1074173776, imaginary2.2806420603419033IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                    .pdata0xb90000x45480x460014f42c90baded23f8dc00df73002a78cFalse0.5132254464285714data5.796600156579775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    .didat0xbe0000x1980x2009761ef77b7321d60f960bfa859df4c2dFalse0.294921875data2.6061387799503875IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                    .wixburn0xbf0000x300x2001a42e805dfc6a3511ca96d60ce037ed0False0.107421875data0.5813091016060967IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    _RDATA0xc00000x15c0x200558d283cbc1650a14570174bb1d3febbFalse0.3984375data3.2625786276652566IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    .rsrc0xc10000x50280x5200107ba3edad4d7cdfa9546aced0f1dce3False0.3156916920731707data5.461268105293538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    .reloc0xc70000x7880x8003fa0b1735b1c909bebcb305a665399aaFalse0.54541015625data5.264719402838329IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                    RT_ICON0xc11c00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.43185920577617326
                                                                    RT_RCDATA0xc1a680x8dataEnglishUnited States1.75
                                                                    RT_MESSAGETABLE0xc1a700x3d74dataEnglishUnited States0.282418001525553
                                                                    RT_GROUP_ICON0xc57e40x14dataEnglishUnited States1.15
                                                                    RT_VERSION0xc57f80x2d0dataEnglishUnited States0.4736111111111111
                                                                    RT_MANIFEST0xc5ac80x560XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (1373), with no line terminatorsEnglishUnited States0.4563953488372093
                                                                    DLLImport
                                                                    KERNEL32.dllGetUserDefaultUILanguage, GetUserDefaultLangID, GetSystemDefaultLangID, GetStringTypeW, ReadFile, SetFilePointerEx, CreateProcessW, DuplicateHandle, FreeLibrary, ProcessIdToSessionId, ConnectNamedPipe, SetNamedPipeHandleState, CreateNamedPipeW, OpenProcess, GetProcessId, SetProcessShutdownParameters, LocalFileTimeToFileTime, SetEndOfFile, SetFileTime, GetExitCodeThread, DosDateTimeToFileTime, CompareStringA, SetThreadExecutionState, ReleaseSemaphore, CreateMutexW, GetExitCodeProcess, CreateFileMappingW, MapViewOfFile, UnmapViewOfFile, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, RtlUnwindEx, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, RaiseException, RtlPcToFileHeader, GetStdHandle, ExitProcess, VerifyVersionInfoW, GetFileType, FindFirstFileExW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetStdHandle, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, GetFileSizeEx, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, WriteConsoleW, GetComputerNameW, GetSystemTime, VerSetConditionMask, CompareStringW, GetNativeSystemInfo, CreateThread, GetCurrentProcess, CreateSemaphoreW, CreateEventW, ReleaseMutex, ResetEvent, SetEvent, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, MoveFileExW, SetFileAttributesW, RemoveDirectoryW, GetFileAttributesW, FindNextFileW, FindFirstFileW, FindClose, DeleteFileW, GetCurrentDirectoryW, ExpandEnvironmentStringsW, GetProcessHeap, HeapSize, HeapFree, GetDateFormatW, HeapReAlloc, HeapAlloc, GetModuleFileNameW, GetSystemWow64DirectoryW, GetSystemDirectoryW, GetLocalTime, Sleep, SetLastError, GetTempPathW, GetVolumePathNameW, GetTempFileNameW, GetFullPathNameW, CreateDirectoryW, LCMapStringW, WideCharToMultiByte, MultiByteToWideChar, lstrlenW, FormatMessageW, LocalFree, LoadLibraryExW, GetProcAddress, GetModuleHandleW, WaitForMultipleObjects, WaitForSingleObject, HeapSetInformation, GetLastError, lstrlenA, GetCurrentProcessId, GetModuleHandleA, MulDiv, CompareStringOrdinal, GetSystemWindowsDirectoryW, GlobalAlloc, GlobalFree, CopyFileW, LoadResource, LockResource, SizeofResource, FindResourceExA, VirtualAlloc, VirtualFree, SystemTimeToTzSpecificLocalTime, SystemTimeToFileTime, GetTimeZoneInformation, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, WriteFile, SetFilePointer, CreateFileA, CloseHandle, GetModuleHandleExW, CreateFileW
                                                                    USER32.dllGetDC, ReleaseDC, MonitorFromPoint, ShowWindow, IsDialogMessageW, LoadBitmapW, SetWindowLongPtrW, GetWindowLongPtrW, GetCursorPos, MessageBoxW, SetWindowPos, CreateWindowExW, UnregisterClassW, RegisterClassW, PostQuitMessage, DefWindowProcW, DispatchMessageW, TranslateMessage, GetMessageW, WaitForInputIdle, IsWindow, PostMessageW, GetMonitorInfoW, LoadCursorW, MonitorFromWindow
                                                                    GDI32.dllDeleteObject, SelectObject, StretchBlt, GetObjectW, DeleteDC, CreateDCW, CreateCompatibleDC, GetDeviceCaps
                                                                    ADVAPI32.dllGetUserNameW, CryptAcquireContextW, QueryServiceConfigW, CryptReleaseContext, CryptGetHashParam, CryptCreateHash, CryptHashData, CryptDestroyHash, OpenProcessToken, AllocateAndInitializeSid, CheckTokenMembership, GetTokenInformation, AdjustTokenPrivileges, IsWellKnownSid, LookupPrivilegeValueW, RegCreateKeyExW, QueryServiceStatus, OpenServiceW, OpenSCManagerW, ControlService, CloseServiceHandle, ChangeServiceConfigW, SetEntriesInAclW, DecryptFileW, InitializeAcl, CreateWellKnownSid, ConvertStringSecurityDescriptorToSecurityDescriptorW, ReportEventW, OpenEventLogW, CloseEventLog, RegQueryInfoKeyW, RegDeleteValueW, RegQueryValueExW, InitiateSystemShutdownExW, RegOpenKeyExW, RegCloseKey, SetNamedSecurityInfoW, RegDeleteKeyW, RegEnumKeyExW, RegEnumValueW, RegSetValueExW, InitializeSecurityDescriptor, SetSecurityDescriptorDacl, SetSecurityDescriptorGroup, SetSecurityDescriptorOwner, SetEntriesInAclA
                                                                    ole32.dllCoInitializeEx, CoInitialize, CoInitializeSecurity, CoUninitialize, CLSIDFromProgID, CoTaskMemFree, StringFromGUID2, CoCreateInstance
                                                                    OLEAUT32.dllVariantClear, SysFreeString, VariantInit, SysAllocString
                                                                    RPCRT4.dllUuidCreate
                                                                    SHELL32.dllCommandLineToArgvW, ShellExecuteExW, SHGetFolderPathW
                                                                    Language of compilation systemCountry where language is spokenMap
                                                                    EnglishUnited States
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Jan 9, 2025 14:44:28.369261980 CET6122753192.168.2.4162.159.36.2
                                                                    Jan 9, 2025 14:44:28.374119043 CET5361227162.159.36.2192.168.2.4
                                                                    Jan 9, 2025 14:44:28.374494076 CET6122753192.168.2.4162.159.36.2
                                                                    Jan 9, 2025 14:44:28.379437923 CET5361227162.159.36.2192.168.2.4
                                                                    Jan 9, 2025 14:44:28.861244917 CET6122753192.168.2.4162.159.36.2
                                                                    Jan 9, 2025 14:44:28.879043102 CET6122753192.168.2.4162.159.36.2
                                                                    Jan 9, 2025 14:44:28.884449959 CET5361227162.159.36.2192.168.2.4
                                                                    Jan 9, 2025 14:44:28.884510040 CET6122753192.168.2.4162.159.36.2
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Jan 9, 2025 14:44:28.368328094 CET5353555162.159.36.2192.168.2.4
                                                                    Jan 9, 2025 14:44:28.950462103 CET53631531.1.1.1192.168.2.4
                                                                    Jan 9, 2025 14:44:29.189342976 CET6439253192.168.2.41.1.1.1
                                                                    Jan 9, 2025 14:44:29.199044943 CET53643921.1.1.1192.168.2.4
                                                                    Jan 9, 2025 14:44:57.049109936 CET5250653192.168.2.41.1.1.1
                                                                    Jan 9, 2025 14:44:57.058150053 CET53525061.1.1.1192.168.2.4
                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                    Jan 9, 2025 14:44:29.189342976 CET192.168.2.41.1.1.10x517Standard query (0)plerukilo0.siteA (IP address)IN (0x0001)false
                                                                    Jan 9, 2025 14:44:57.049109936 CET192.168.2.41.1.1.10xdc88Standard query (0)plerukilo0.siteA (IP address)IN (0x0001)false
                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                    Jan 9, 2025 14:44:29.199044943 CET1.1.1.1192.168.2.40x517Name error (3)plerukilo0.sitenonenoneA (IP address)IN (0x0001)false
                                                                    Jan 9, 2025 14:44:57.058150053 CET1.1.1.1192.168.2.40xdc88Name error (3)plerukilo0.sitenonenoneA (IP address)IN (0x0001)false

                                                                    Click to jump to process

                                                                    Click to jump to process

                                                                    Click to dive into process behavior distribution

                                                                    Click to jump to process

                                                                    Target ID:0
                                                                    Start time:08:43:41
                                                                    Start date:09/01/2025
                                                                    Path:C:\Users\user\Desktop\VmjvNTbD5J.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"C:\Users\user\Desktop\VmjvNTbD5J.exe"
                                                                    Imagebase:0x7ff657080000
                                                                    File size:7'884'295 bytes
                                                                    MD5 hash:AB660C89D26121D4041874614646FD75
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:low
                                                                    Has exited:true

                                                                    Target ID:1
                                                                    Start time:08:43:42
                                                                    Start date:09/01/2025
                                                                    Path:C:\Windows\Temp\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"C:\Windows\TEMP\{183D20FC-2635-447B-B387-8CCFB1626C88}\.cr\VmjvNTbD5J.exe" -burn.clean.room="C:\Users\user\Desktop\VmjvNTbD5J.exe" -burn.filehandle.attached=564 -burn.filehandle.self=572
                                                                    Imagebase:0x7ff743d30000
                                                                    File size:7'814'631 bytes
                                                                    MD5 hash:B153C388223577EA044ACA3908BE2935
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Antivirus matches:
                                                                    • Detection: 58%, ReversingLabs
                                                                    Reputation:low
                                                                    Has exited:true

                                                                    Target ID:2
                                                                    Start time:08:43:43
                                                                    Start date:09/01/2025
                                                                    Path:C:\Windows\Temp\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:C:\Windows\TEMP\{AB6ED4D2-8A43-42EF-89A9-2D0F6A021EFE}\.ba\WebCopier.exe
                                                                    Imagebase:0x400000
                                                                    File size:7'579'704 bytes
                                                                    MD5 hash:E2A27870BA4DA90DF6276C4DA9E3CF82
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Antivirus matches:
                                                                    • Detection: 0%, ReversingLabs
                                                                    Reputation:moderate
                                                                    Has exited:true

                                                                    Target ID:3
                                                                    Start time:08:43:44
                                                                    Start date:09/01/2025
                                                                    Path:C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exe
                                                                    Imagebase:0x400000
                                                                    File size:7'579'704 bytes
                                                                    MD5 hash:E2A27870BA4DA90DF6276C4DA9E3CF82
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Antivirus matches:
                                                                    • Detection: 0%, ReversingLabs
                                                                    Reputation:moderate
                                                                    Has exited:true

                                                                    Target ID:4
                                                                    Start time:08:43:45
                                                                    Start date:09/01/2025
                                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:C:\Windows\SysWOW64\cmd.exe
                                                                    Imagebase:0x240000
                                                                    File size:236'544 bytes
                                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:5
                                                                    Start time:08:43:45
                                                                    Start date:09/01/2025
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff7699e0000
                                                                    File size:862'208 bytes
                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:10
                                                                    Start time:08:44:09
                                                                    Start date:09/01/2025
                                                                    Path:C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exe
                                                                    Imagebase:0x140000000
                                                                    File size:2'364'728 bytes
                                                                    MD5 hash:967F4470627F823F4D7981E511C9824F
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Antivirus matches:
                                                                    • Detection: 0%, ReversingLabs
                                                                    Reputation:moderate
                                                                    Has exited:true

                                                                    Target ID:11
                                                                    Start time:08:44:23
                                                                    Start date:09/01/2025
                                                                    Path:C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Users\user\AppData\Roaming\ChromeQuick_DVBv5\WebCopier.exe"
                                                                    Imagebase:0x400000
                                                                    File size:7'579'704 bytes
                                                                    MD5 hash:E2A27870BA4DA90DF6276C4DA9E3CF82
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:moderate
                                                                    Has exited:true

                                                                    Target ID:12
                                                                    Start time:08:44:23
                                                                    Start date:09/01/2025
                                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:C:\Windows\SysWOW64\cmd.exe
                                                                    Imagebase:0x240000
                                                                    File size:236'544 bytes
                                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:13
                                                                    Start time:08:44:23
                                                                    Start date:09/01/2025
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff7699e0000
                                                                    File size:862'208 bytes
                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:14
                                                                    Start time:08:44:39
                                                                    Start date:09/01/2025
                                                                    Path:C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Users\user\AppData\Local\Temp\EKU_Make_debug_v4.exe
                                                                    Imagebase:0x140000000
                                                                    File size:2'364'728 bytes
                                                                    MD5 hash:967F4470627F823F4D7981E511C9824F
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Reset < >

                                                                      Execution Graph

                                                                      Execution Coverage:5.3%
                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                      Signature Coverage:26.9%
                                                                      Total number of Nodes:1450
                                                                      Total number of Limit Nodes:44
                                                                      execution_graph 43377 7ff657088250 10 API calls __swprintf_l 43378 7ff65708b050 9 API calls _cwprintf_s_l 43431 7ff65708b350 17 API calls _cwprintf_s_l 43432 7ff65708ad50 13 API calls _cwprintf_s_l 43379 7ff6570b5240 30 API calls 2 library calls 43380 7ff65708b640 75 API calls _cwprintf_s_l 43433 7ff65708b140 81 API calls 3 library calls 43381 7ff6570c9440 61 API calls _cwprintf_s_l 43382 7ff6570d3c40 48 API calls 2 library calls 41638 7ff6570b6a70 41640 7ff6570b6abb 41638->41640 41639 7ff6570b6ac7 _cwprintf_s_l 41640->41639 41641 7ff6570b6b5a SetFilePointerEx 41640->41641 41641->41639 41642 7ff6570b6b78 GetLastError 41641->41642 41642->41639 43435 7ff65708a770 6 API calls _cwprintf_s_l 43436 7ff65708af70 15 API calls 2 library calls 43437 7ff6570d3b70 59 API calls 3 library calls 43385 7ff6570a9060 64 API calls _cwprintf_s_l 43439 7ff6570b5b60 103 API calls __swprintf_l 41832 7ff6570d3c5c 41853 7ff6570d3fa4 41832->41853 41835 7ff6570d3da8 41887 7ff6570d42ec 7 API calls 2 library calls 41835->41887 41836 7ff6570d3c78 __scrt_acquire_startup_lock 41838 7ff6570d3db2 41836->41838 41845 7ff6570d3c96 __scrt_release_startup_lock 41836->41845 41888 7ff6570d42ec 7 API calls 2 library calls 41838->41888 41840 7ff6570d3cbb 41841 7ff6570d3dbd __GetCurrentState 41842 7ff6570d3d41 41861 7ff6570d4438 41842->41861 41844 7ff6570d3d46 41864 7ff6570810b0 41844->41864 41845->41840 41845->41842 41884 7ff6570db828 47 API calls 41845->41884 41850 7ff6570d3d69 41850->41841 41886 7ff6570d4138 7 API calls __scrt_initialize_crt 41850->41886 41852 7ff6570d3d80 41852->41840 41889 7ff6570d45c0 41853->41889 41856 7ff6570d3fd3 41891 7ff6570dbf6c 41856->41891 41860 7ff6570d3c70 41860->41835 41860->41836 41929 7ff6570d47d0 41861->41929 41931 7ff65708543c SetLastError GetModuleFileNameW 41864->41931 41866 7ff657081155 41867 7ff657081159 CreateFileW 41866->41867 41868 7ff657081188 41866->41868 41867->41868 41946 7ff6570893cc 41868->41946 41871 7ff65708119b 42066 7ff657081728 76 API calls 41871->42066 41872 7ff657081194 42065 7ff6570817c8 HeapSetInformation 41872->42065 41875 7ff657081199 41951 7ff657089464 41875->41951 41877 7ff6570811c3 _cwprintf_s_l 41878 7ff6570811fa CloseHandle 41877->41878 41879 7ff657081203 41877->41879 41878->41879 41880 7ff657081211 41879->41880 42067 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 41879->42067 41882 7ff6570d3b50 _log10_special 8 API calls 41880->41882 41883 7ff657081225 41882->41883 41885 7ff6570d447c GetModuleHandleW 41883->41885 41884->41842 41885->41850 41886->41852 41887->41838 41888->41841 41890 7ff6570d3fc6 __scrt_dllmain_crt_thread_attach 41889->41890 41890->41856 41890->41860 41892 7ff6570e0e2c 41891->41892 41893 7ff6570d3fd8 41892->41893 41896 7ff6570de440 41892->41896 41893->41860 41895 7ff6570d5628 7 API calls 2 library calls 41893->41895 41895->41860 41897 7ff6570de450 41896->41897 41899 7ff6570de45b __vcrt_uninitialize_ptd 41897->41899 41900 7ff6570de2b8 GetLastError 41897->41900 41899->41892 41901 7ff6570de2f9 FlsSetValue 41900->41901 41903 7ff6570de2dc 41900->41903 41902 7ff6570de30b 41901->41902 41914 7ff6570de2e9 41901->41914 41917 7ff6570de884 41902->41917 41903->41901 41903->41914 41904 7ff6570de365 SetLastError 41904->41899 41907 7ff6570de338 FlsSetValue 41910 7ff6570de344 FlsSetValue 41907->41910 41911 7ff6570de356 41907->41911 41908 7ff6570de328 FlsSetValue 41909 7ff6570de331 41908->41909 41924 7ff6570dc91c 11 API calls 2 library calls 41909->41924 41910->41909 41925 7ff6570ddee4 11 API calls _set_fmode 41911->41925 41914->41904 41915 7ff6570de35e 41926 7ff6570dc91c 11 API calls 2 library calls 41915->41926 41922 7ff6570de895 _set_fmode 41917->41922 41918 7ff6570de8e6 41928 7ff6570da7ec 11 API calls _set_fmode 41918->41928 41919 7ff6570de8ca HeapAlloc 41920 7ff6570de31a 41919->41920 41919->41922 41920->41907 41920->41908 41922->41918 41922->41919 41927 7ff6570e0f10 EnterCriticalSection LeaveCriticalSection _set_fmode 41922->41927 41924->41914 41925->41915 41926->41904 41927->41922 41928->41920 41930 7ff6570d444f GetStartupInfoW 41929->41930 41930->41844 41932 7ff6570854be 41931->41932 41933 7ff65708547e GetLastError 41931->41933 41934 7ff6570854c7 GetLastError 41932->41934 41939 7ff6570854e3 41932->41939 41937 7ff6570854b2 _cwprintf_s_l 41933->41937 41935 7ff6570854d6 41934->41935 41934->41939 41936 7ff6570844c4 _cwprintf_s_l 2 API calls 41935->41936 41936->41939 41937->41866 41938 7ff65708550a SetLastError 41940 7ff657085515 GetModuleFileNameW 41938->41940 41939->41937 41939->41938 41941 7ff6570854fa 41939->41941 41942 7ff65708552c GetLastError 41940->41942 41943 7ff6570855c3 GetLastError 41940->41943 41941->41938 41942->41937 41945 7ff65708553b 41942->41945 41944 7ff65708555c _cwprintf_s_l 41943->41944 41944->41937 41945->41940 41945->41944 41947 7ff6570893f4 lstrlenW 41946->41947 41948 7ff657089410 41946->41948 41947->41948 41949 7ff657081190 41948->41949 41950 7ff65708942d CompareStringW 41948->41950 41949->41871 41949->41872 41950->41949 41952 7ff6570894c8 memcpy_s 41951->41952 41953 7ff657089502 GetModuleHandleW 41952->41953 42068 7ff6570e847c InitializeCriticalSection 41953->42068 41955 7ff657089519 42069 7ff6570e87d0 41955->42069 41961 7ff657089589 41962 7ff65708954b _cwprintf_s_l 41961->41962 41963 7ff6570895be 41961->41963 41965 7ff6570895b0 41961->41965 41964 7ff657089915 41962->41964 42267 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 41962->42267 41969 7ff6570895c3 CoInitializeEx 41963->41969 41967 7ff657089927 41964->41967 42268 7ff65709f0c8 136 API calls _cwprintf_s_l 41964->42268 42260 7ff6570b5628 15 API calls 2 library calls 41965->42260 42236 7ff657099270 41967->42236 41969->41962 41971 7ff6570895e4 41969->41971 42091 7ff6570e76e8 41971->42091 41976 7ff6570895ee 41976->41962 42106 7ff6570efa80 41976->42106 41981 7ff657089977 41987 7ff6570899b5 41981->41987 41990 7ff657089990 41981->41990 41983 7ff657089613 41983->41962 42120 7ff6570edab4 41983->42120 41984 7ff65708994b 41984->41981 41991 7ff657089b38 77 API calls 41984->41991 41985 7ff6570899b3 41989 7ff6570e8178 EnterCriticalSection FlushFileBuffers GetLastError LeaveCriticalSection 41985->41989 41987->41985 41992 7ff657089b38 77 API calls 41987->41992 41993 7ff6570899f2 41989->41993 41994 7ff657089b38 77 API calls 41990->41994 41991->41981 41992->41985 41996 7ff657089a19 41993->41996 42000 7ff657089a04 41993->42000 41994->41985 41997 7ff657089a1f 41996->41997 41998 7ff657089a17 41996->41998 42001 7ff657089b38 77 API calls 41997->42001 42002 7ff6570b5dc0 IsWindow PostMessageW 41998->42002 41999 7ff657089653 42138 7ff6570e8c84 41999->42138 42003 7ff6570a0c78 60 API calls 42000->42003 42005 7ff657089a2e 42001->42005 42006 7ff657089a60 42002->42006 42003->41998 42008 7ff6570882a8 94 API calls 42005->42008 42009 7ff657089a72 42006->42009 42010 7ff657089a64 42006->42010 42013 7ff657089a37 42008->42013 42011 7ff6570a9c68 WaitForSingleObject GetLastError SetEvent GetLastError 42009->42011 42014 7ff6570ad1c4 WaitForSingleObject GetLastError 42010->42014 42015 7ff657089a7b 42011->42015 42013->41998 42018 7ff6570e7f80 77 API calls 42013->42018 42016 7ff657089a70 42014->42016 42017 7ff6570e878c EnterCriticalSection LeaveCriticalSection 42015->42017 42021 7ff657089124 19 API calls 42016->42021 42019 7ff657089a84 42017->42019 42018->41998 42022 7ff657089aa6 42019->42022 42028 7ff6570e887c __swprintf_l 10 API calls 42019->42028 42020 7ff65708543c 10 API calls 42024 7ff6570896f0 42020->42024 42025 7ff657089ac8 42021->42025 42033 7ff657089b38 77 API calls 42022->42033 42023 7ff6570896b8 42023->42020 42148 7ff657089b38 42024->42148 42027 7ff657089ad4 42025->42027 42030 7ff6570ef7d0 CoUninitialize 42025->42030 42031 7ff657089ae0 42027->42031 42035 7ff6570ee250 FreeLibrary 42027->42035 42032 7ff657089a95 42028->42032 42030->42027 42036 7ff657089aec 42031->42036 42039 7ff6570eb31c FreeLibrary 42031->42039 42032->42022 42040 7ff657084278 _cwprintf_s_l GetProcessHeap RtlFreeHeap GetLastError 42032->42040 42033->42016 42034 7ff657089756 42151 7ff6570aaafc 42034->42151 42035->42031 42041 7ff657089afd 42036->42041 42043 7ff6570efb74 FreeLibrary FreeLibrary 42036->42043 42039->42036 42040->42022 42044 7ff657089b01 CoUninitialize 42041->42044 42045 7ff657089b07 42041->42045 42046 7ff657089af8 42043->42046 42044->42045 42049 7ff6570e8a34 83 API calls 42045->42049 42048 7ff6570e7890 FreeLibrary FreeLibrary 42046->42048 42047 7ff6570898d3 42202 7ff657088e70 42047->42202 42048->42041 42052 7ff657089b13 42049->42052 42050 7ff65708988f 42050->41962 42266 7ff6570889d0 627 API calls _cwprintf_s_l 42050->42266 42054 7ff6570d3b50 _log10_special 8 API calls 42052->42054 42058 7ff657089b24 42054->42058 42056 7ff6570898b9 42056->41962 42056->42047 42057 7ff6570897ce 42057->41962 42263 7ff65709fed4 76 API calls 2 library calls 42057->42263 42058->41877 42060 7ff6570897a5 42262 7ff657088d08 168 API calls _cwprintf_s_l 42060->42262 42062 7ff6570897fe 42064 7ff657089804 _cwprintf_s_l 42062->42064 42264 7ff6570889d0 627 API calls _cwprintf_s_l 42062->42264 42064->41962 42265 7ff6570886c8 228 API calls _cwprintf_s_l 42064->42265 42066->41875 42067->41880 42068->41955 42070 7ff65708952f 42069->42070 42071 7ff6570e87e0 42069->42071 42073 7ff6570e67b0 42070->42073 42071->42070 42269 7ff65708c0c0 42071->42269 42074 7ff6570e67ea 42073->42074 42075 7ff6570e6844 CommandLineToArgvW 42074->42075 42076 7ff6570e67f0 _cwprintf_s_l 42074->42076 42075->42076 42077 7ff6570e6859 GetLastError 42075->42077 42078 7ff657089545 42076->42078 42357 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42076->42357 42077->42076 42078->41962 42080 7ff657088018 InitializeCriticalSection InitializeCriticalSection InitializeCriticalSection 42078->42080 42081 7ff65708808f 42080->42081 42082 7ff65708809e GetCurrentProcess 42081->42082 42358 7ff6570e8e18 OpenProcessToken 42082->42358 42086 7ff6570880e0 42089 7ff6570880e6 _cwprintf_s_l 42086->42089 42431 7ff657090238 42086->42431 42089->41961 42092 7ff657081a28 73 API calls 42091->42092 42093 7ff6570e7701 42092->42093 42094 7ff6570e773f 42093->42094 42095 7ff6570e7707 GetProcAddressForCaller GetProcAddress 42093->42095 42096 7ff6570e7772 _cwprintf_s_l 42094->42096 42097 7ff657081a28 73 API calls 42094->42097 42095->42094 42096->41976 42098 7ff6570e776c 42097->42098 42098->42096 42099 7ff6570e77a2 GetProcAddress 42098->42099 42100 7ff6570e780f GetProcAddress 42099->42100 42101 7ff6570e77c7 42099->42101 42100->42096 42103 7ff6570e7834 42100->42103 42101->42100 42102 7ff6570e77cc GetLastError 42101->42102 42104 7ff6570e77fe _cwprintf_s_l 42102->42104 42103->42096 42105 7ff6570e7839 GetLastError 42103->42105 42104->42096 42105->42104 42107 7ff657081a28 73 API calls 42106->42107 42108 7ff6570efa97 42107->42108 42109 7ff6570efad1 42108->42109 42110 7ff6570efa9b GetProcAddress GetProcAddress 42108->42110 42111 7ff657081a28 73 API calls 42109->42111 42110->42109 42112 7ff6570efae4 42111->42112 42113 7ff65708960e 42112->42113 42114 7ff6570efae8 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 42112->42114 42115 7ff6570ea270 42113->42115 42114->42113 42116 7ff657081a28 73 API calls 42115->42116 42117 7ff6570ea289 42116->42117 42118 7ff6570ea2ba GetProcAddress GetProcAddress 42117->42118 42119 7ff6570ea28f _cwprintf_s_l 42117->42119 42118->42119 42119->41983 42121 7ff657081ae4 67 API calls 42120->42121 42122 7ff6570edad8 42121->42122 42125 7ff6570edade _cwprintf_s_l 42122->42125 42809 7ff6570f3128 42122->42809 42124 7ff6570edb24 7 API calls 42126 7ff6570edc7e GetProcAddress 42124->42126 42127 7ff6570edc99 42124->42127 42130 7ff657089633 42125->42130 42820 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42125->42820 42126->42127 42128 7ff6570edca3 GetProcAddress 42127->42128 42129 7ff6570edcbe 42127->42129 42128->42129 42129->42125 42130->41962 42132 7ff6570eee04 42130->42132 42133 7ff6570eee13 CoInitialize 42132->42133 42134 7ff6570eee24 42132->42134 42133->42134 42135 7ff6570eee73 CLSIDFromProgID 42134->42135 42137 7ff6570eee28 _cwprintf_s_l 42134->42137 42136 7ff6570eee8b CLSIDFromProgID 42135->42136 42135->42137 42136->42137 42137->41999 42139 7ff6570e8cb0 42138->42139 42145 7ff6570e8cd3 _cwprintf_s_l 42138->42145 42140 7ff657081a28 73 API calls 42139->42140 42141 7ff6570e8cca 42140->42141 42144 7ff6570e8d2b GetProcAddress 42141->42144 42141->42145 42142 7ff6570e8e00 FreeLibrary 42143 7ff65708967a GetNativeSystemInfo 42142->42143 42143->42023 42146 7ff6570e8d74 _cwprintf_s_l 42144->42146 42147 7ff6570e8d42 GetLastError 42144->42147 42145->42142 42145->42143 42146->42145 42147->42146 42821 7ff6570e843c 42148->42821 42152 7ff6570aab3c memcpy_s 42151->42152 42832 7ff65708c924 InitializeCriticalSection 42152->42832 42157 7ff6570aaf99 42863 7ff657091410 42157->42863 42162 7ff6570aafa2 42164 7ff6570aafb0 42162->42164 42882 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42162->42882 42165 7ff6570aafbe 42164->42165 42883 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42164->42883 42169 7ff657089765 42165->42169 42171 7ff657086a48 _cwprintf_s_l 3 API calls 42165->42171 42169->42047 42169->42050 42169->42057 42169->42060 42169->42064 42171->42169 42172 7ff6570aabe5 42184 7ff6570aab55 _cwprintf_s_l 42172->42184 42870 7ff6570a8728 64 API calls 2 library calls 42172->42870 42174 7ff6570aac3d 42175 7ff657089b38 77 API calls 42174->42175 42174->42184 42176 7ff6570aac75 42175->42176 42177 7ff6570aac7e 42176->42177 42178 7ff6570aacc3 42176->42178 42871 7ff6570e7f80 77 API calls 3 library calls 42177->42871 42872 7ff6570aafe4 67 API calls 2 library calls 42178->42872 42181 7ff6570aaccb 42181->42184 42873 7ff65708db48 87 API calls 42181->42873 42183 7ff6570aad04 42183->42184 42874 7ff65708db48 87 API calls 42183->42874 42184->42157 42881 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42184->42881 42186 7ff6570aad90 42186->42184 42188 7ff6570aae27 42186->42188 42191 7ff65708db80 87 API calls 42186->42191 42187 7ff6570aad5a 42187->42184 42187->42186 42875 7ff65708db80 42187->42875 42188->42184 42190 7ff6570aae61 42188->42190 42192 7ff65708db80 87 API calls 42188->42192 42190->42184 42193 7ff6570aaea6 42190->42193 42878 7ff6570a5074 116 API calls _cwprintf_s_l 42190->42878 42197 7ff6570aadce 42191->42197 42192->42190 42193->42184 42879 7ff657095d48 99 API calls 2 library calls 42193->42879 42196 7ff6570aaee7 42196->42184 42880 7ff657091f94 91 API calls _cwprintf_s_l 42196->42880 42197->42184 42198 7ff65708db80 87 API calls 42197->42198 42198->42188 42200 7ff6570aaf0e 42200->42184 42201 7ff657084be0 2 API calls 42200->42201 42201->42184 42969 7ff65709eb98 42202->42969 42205 7ff65708543c 10 API calls 42207 7ff657088f1b 42205->42207 42206 7ff65708907a IsWindow 42208 7ff657089088 PostMessageW 42206->42208 42209 7ff65708909c 42206->42209 42217 7ff657088f42 42207->42217 42227 7ff657088ede _cwprintf_s_l 42207->42227 43008 7ff6570a39b8 42207->43008 42208->42209 42210 7ff6570890b0 42209->42210 42211 7ff6570890a5 CloseHandle 42209->42211 42212 7ff6570890c7 42210->42212 42213 7ff6570890bd CloseHandle 42210->42213 42211->42210 42215 7ff6570890d0 CloseHandle 42212->42215 42216 7ff6570890da 42212->42216 42213->42212 42215->42216 42219 7ff6570890df CloseHandle 42216->42219 42220 7ff6570890e8 42216->42220 42217->42227 43015 7ff6570a9d28 42217->43015 42219->42220 43052 7ff657084578 42220->43052 42221 7ff657088f9b 42221->42227 43038 7ff657083224 42221->43038 42226 7ff657084578 5 API calls 42228 7ff6570890fa 42226->42228 42227->42206 42230 7ff657089108 42228->42230 43057 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42228->43057 42233 7ff657089116 42230->42233 43058 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42230->43058 42231 7ff65708900a 42231->42227 43046 7ff6570e9750 42231->43046 42233->41962 42237 7ff65709927f 42236->42237 42238 7ff657089933 42236->42238 43294 7ff6570872ac 42237->43294 42240 7ff6570a56ac 42238->42240 42241 7ff65708993f 42240->42241 42242 7ff6570a56ba 42240->42242 42244 7ff6570a59ac 42241->42244 42243 7ff6570872ac 99 API calls 42242->42243 42243->42241 42245 7ff6570a59c1 42244->42245 42246 7ff6570a59cc 42244->42246 43345 7ff6570841a8 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42245->43345 42248 7ff6570a59da 42246->42248 43346 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42246->43346 42250 7ff6570a59e8 42248->42250 43347 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42248->43347 42252 7ff6570a59f6 42250->42252 43348 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42250->43348 42253 7ff6570a5a07 42252->42253 43349 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42252->43349 42256 7ff6570a5a18 42253->42256 43350 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42253->43350 42258 7ff6570a5a29 42256->42258 43351 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42256->43351 42260->41963 42261 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42261->42034 42262->42057 42263->42062 42264->42064 42265->42050 42266->42056 42267->41964 42268->41967 42272 7ff6570e8850 42269->42272 42271 7ff65708c0dc 42271->42070 42273 7ff6570e8859 42272->42273 42274 7ff6570e8861 42273->42274 42277 7ff6570e7cd0 42273->42277 42274->42271 42278 7ff6570837b4 _cwprintf_s_l 10 API calls 42277->42278 42279 7ff6570e7d05 _cwprintf_s_l 42278->42279 42280 7ff6570e7d0b _cwprintf_s_l 42279->42280 42286 7ff6570e7a38 42279->42286 42281 7ff6570e7dc3 42280->42281 42306 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42280->42306 42284 7ff6570e7dd2 42281->42284 42307 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42281->42307 42284->42271 42287 7ff6570e7a82 EnterCriticalSection 42286->42287 42288 7ff6570e7ca4 42286->42288 42289 7ff6570e7bdb 42287->42289 42290 7ff6570e7a98 GetCurrentProcessId GetCurrentThreadId GetLocalTime 42287->42290 42291 7ff6570d3b50 _log10_special 8 API calls 42288->42291 42308 7ff657083cd8 42289->42308 42295 7ff6570e7ad6 42290->42295 42293 7ff6570e7cb2 42291->42293 42293->42280 42294 7ff6570e7bfb 42301 7ff6570e7bb7 _cwprintf_s_l 42294->42301 42323 7ff6570e887c EnterCriticalSection 42294->42323 42332 7ff6570831dc 42295->42332 42299 7ff6570e7bab 42299->42301 42300 7ff6570e7c7b LeaveCriticalSection 42302 7ff6570e7c91 42300->42302 42303 7ff6570e7c96 42300->42303 42301->42300 42335 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42302->42335 42303->42288 42336 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42303->42336 42306->42281 42307->42284 42309 7ff657083d15 42308->42309 42313 7ff657083d1e 42308->42313 42337 7ff657084528 GetProcessHeap HeapSize _cwprintf_s_l 42309->42337 42310 7ff657083d61 WideCharToMultiByte 42312 7ff657083d8d GetLastError 42310->42312 42317 7ff657083df3 42310->42317 42315 7ff657083d24 _cwprintf_s_l 42312->42315 42313->42310 42313->42315 42313->42317 42314 7ff657083eac WideCharToMultiByte 42314->42315 42316 7ff657083ee2 GetLastError 42314->42316 42315->42294 42316->42315 42317->42314 42317->42315 42318 7ff657083e5c 42317->42318 42319 7ff657083e49 42317->42319 42339 7ff657086828 GetProcessHeap HeapAlloc 42318->42339 42338 7ff657086ba0 GetProcessHeap HeapReAlloc 42319->42338 42324 7ff6570e88b1 42323->42324 42325 7ff6570e8945 42324->42325 42326 7ff6570e8973 42324->42326 42331 7ff6570e88f5 _cwprintf_s_l 42324->42331 42340 7ff657083aec 6 API calls 2 library calls 42325->42340 42327 7ff6570e8a12 LeaveCriticalSection 42326->42327 42328 7ff6570e897b WriteFile 42326->42328 42327->42301 42328->42326 42330 7ff6570e899a GetLastError 42328->42330 42330->42326 42330->42331 42331->42327 42341 7ff657081e3c 42332->42341 42334 7ff6570831fd 42334->42289 42334->42299 42335->42303 42336->42288 42337->42313 42340->42331 42342 7ff657081e79 42341->42342 42346 7ff657081e82 42341->42346 42352 7ff657086f2c GetProcessHeap HeapSize _cwprintf_s_l 42342->42352 42347 7ff657081e8a _cwprintf_s_l 42346->42347 42349 7ff657081f49 42346->42349 42353 7ff657082088 58 API calls 2 library calls 42346->42353 42347->42334 42349->42347 42350 7ff657081fd4 _cwprintf_s_l 42349->42350 42354 7ff657082e58 50 API calls 2 library calls 42349->42354 42355 7ff657082088 58 API calls 2 library calls 42349->42355 42350->42347 42356 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42350->42356 42352->42346 42353->42349 42354->42349 42355->42349 42356->42347 42357->42078 42359 7ff6570e8e44 GetLastError 42358->42359 42360 7ff6570e8e81 GetTokenInformation 42358->42360 42362 7ff6570e8e78 _cwprintf_s_l 42359->42362 42361 7ff6570e8eb6 GetLastError 42360->42361 42360->42362 42361->42362 42363 7ff6570e8f25 CloseHandle 42362->42363 42364 7ff6570880b3 42362->42364 42363->42364 42365 7ff6570ab24c 42364->42365 42406 7ff6570ab504 _cwprintf_s_l 42365->42406 42414 7ff6570ab29b _cwprintf_s_l 42365->42414 42366 7ff6570ab2b8 CompareStringW 42369 7ff6570ab2e7 CompareStringW 42366->42369 42370 7ff6570ac69b CompareStringW 42366->42370 42367 7ff6570ac73a 42507 7ff6570869ec 6 API calls _cwprintf_s_l 42367->42507 42369->42370 42371 7ff6570ab31a CompareStringW 42369->42371 42370->42414 42371->42370 42372 7ff6570ab34e CompareStringW 42371->42372 42373 7ff6570ab382 CompareStringW 42372->42373 42372->42414 42374 7ff6570ab3b6 CompareStringW 42373->42374 42373->42414 42375 7ff6570ab3ea CompareStringW 42374->42375 42374->42414 42376 7ff6570ab41e CompareStringW 42375->42376 42375->42414 42377 7ff6570ab452 CompareStringW 42376->42377 42376->42414 42378 7ff6570ab486 CompareStringW 42377->42378 42377->42414 42379 7ff6570ab4ba CompareStringW 42378->42379 42378->42414 42380 7ff6570ab556 CompareStringW 42379->42380 42379->42414 42381 7ff6570ab612 CompareStringW 42380->42381 42380->42414 42382 7ff6570ab659 CompareStringW 42381->42382 42381->42414 42383 7ff6570ab6a0 CompareStringW 42382->42383 42382->42414 42384 7ff6570ab6e7 CompareStringW 42383->42384 42383->42414 42385 7ff6570ab72e CompareStringW 42384->42385 42384->42414 42386 7ff6570ab762 CompareStringW 42385->42386 42385->42414 42387 7ff6570ab796 CompareStringW 42386->42387 42386->42414 42388 7ff6570ab7d1 CompareStringW 42387->42388 42387->42414 42389 7ff6570ab816 CompareStringW 42388->42389 42388->42414 42390 7ff6570ab84f CompareStringW 42389->42390 42389->42414 42391 7ff6570ab8c0 CompareStringW 42390->42391 42390->42414 42392 7ff6570ab931 CompareStringW 42391->42392 42391->42414 42393 7ff6570ab991 CompareStringW 42392->42393 42392->42414 42394 7ff6570ab9fd lstrlenW CompareStringW 42393->42394 42393->42414 42395 7ff6570abafe CompareStringW 42394->42395 42396 7ff6570aba3c lstrlenW 42394->42396 42397 7ff6570abc39 lstrlenW lstrlenW CompareStringW 42395->42397 42395->42414 42396->42414 42398 7ff6570abd81 lstrlenW lstrlenW CompareStringW 42397->42398 42397->42414 42399 7ff6570abdd1 lstrlenW 42398->42399 42400 7ff6570abe54 CompareStringW 42398->42400 42399->42414 42401 7ff6570abee5 CompareStringW 42400->42401 42400->42414 42404 7ff6570abf36 CompareStringW 42401->42404 42401->42414 42403 7ff6570abd05 lstrlenW 42403->42414 42405 7ff6570abf6d CompareStringW 42404->42405 42404->42414 42407 7ff6570abfac CompareStringW 42405->42407 42405->42414 42406->42086 42408 7ff6570abfe3 CompareStringW 42407->42408 42407->42414 42409 7ff6570ac022 CompareStringW 42408->42409 42408->42414 42411 7ff6570ac05c CompareStringW 42409->42411 42409->42414 42410 7ff657089b38 77 API calls 42410->42414 42412 7ff6570ac096 CompareStringW 42411->42412 42411->42414 42413 7ff6570ac0d0 CompareStringW 42412->42413 42412->42414 42413->42414 42415 7ff6570ac108 CompareStringW 42413->42415 42414->42366 42414->42367 42414->42370 42414->42390 42414->42400 42414->42401 42414->42403 42414->42404 42414->42406 42414->42410 42414->42413 42414->42415 42418 7ff6570ac23c lstrlenW lstrlenW CompareStringW 42414->42418 42419 7ff6570ac30e lstrlenW lstrlenW CompareStringW 42414->42419 42425 7ff6570850b4 66 API calls 42414->42425 42429 7ff6570ac60e lstrlenW lstrlenW CompareStringW 42414->42429 42506 7ff6570869ec 6 API calls _cwprintf_s_l 42414->42506 42415->42414 42416 7ff6570ac18a lstrlenW lstrlenW CompareStringW 42415->42416 42417 7ff6570ac1d6 lstrlenW 42416->42417 42416->42418 42417->42414 42418->42419 42420 7ff6570ac28c lstrlenW 42418->42420 42421 7ff6570ac35a lstrlenW 42419->42421 42422 7ff6570ac3bb lstrlenW lstrlenW CompareStringW 42419->42422 42420->42414 42421->42414 42423 7ff6570ac409 lstrlenW 42422->42423 42424 7ff6570ac4a6 lstrlenW lstrlenW CompareStringW 42422->42424 42430 7ff6570ac42d _cwprintf_s_l 42423->42430 42426 7ff6570ac4f0 lstrlenW 42424->42426 42427 7ff6570ac556 lstrlenW lstrlenW CompareStringW 42424->42427 42425->42414 42426->42430 42428 7ff6570ac5a0 lstrlenW 42427->42428 42427->42429 42428->42414 42429->42367 42429->42414 42430->42424 42430->42427 42432 7ff657090295 memcpy_s 42431->42432 42433 7ff657090312 SetFilePointerEx 42432->42433 42434 7ff6570902ca GetLastError 42432->42434 42435 7ff657090371 ReadFile 42433->42435 42436 7ff657090334 GetLastError 42433->42436 42445 7ff6570902fd _cwprintf_s_l 42434->42445 42437 7ff6570903cf 42435->42437 42438 7ff65709038f GetLastError 42435->42438 42436->42445 42439 7ff6570903e9 SetFilePointerEx 42437->42439 42437->42445 42438->42445 42440 7ff657090440 ReadFile 42439->42440 42441 7ff657090400 GetLastError 42439->42441 42443 7ff657090495 _cwprintf_s_l 42440->42443 42444 7ff657090461 GetLastError 42440->42444 42442 7ff657090434 _cwprintf_s_l 42441->42442 42442->42440 42443->42445 42447 7ff6570904b9 SetFilePointerEx 42443->42447 42444->42443 42446 7ff6570d3b50 _log10_special 8 API calls 42445->42446 42448 7ff657088107 42446->42448 42449 7ff65709051d ReadFile 42447->42449 42450 7ff6570904dd GetLastError 42447->42450 42448->42089 42480 7ff6570a4ddc 42448->42480 42452 7ff657090581 ReadFile 42449->42452 42453 7ff657090541 GetLastError 42449->42453 42451 7ff657090511 _cwprintf_s_l 42450->42451 42451->42449 42455 7ff6570905e0 SetFilePointerEx 42452->42455 42456 7ff6570905a0 GetLastError 42452->42456 42454 7ff657090575 _cwprintf_s_l 42453->42454 42454->42452 42457 7ff657090642 ReadFile 42455->42457 42458 7ff657090602 GetLastError 42455->42458 42459 7ff6570905d4 _cwprintf_s_l 42456->42459 42461 7ff6570906bc GetLastError 42457->42461 42463 7ff657090667 42457->42463 42460 7ff657090636 _cwprintf_s_l 42458->42460 42459->42455 42460->42457 42461->42445 42462 7ff657090749 42462->42445 42508 7ff657086828 GetProcessHeap HeapAlloc 42462->42508 42463->42445 42463->42462 42464 7ff657090695 ReadFile 42463->42464 42471 7ff657090722 _cwprintf_s_l 42463->42471 42464->42461 42464->42463 42466 7ff65709078d 42466->42445 42467 7ff6570907be SetFilePointerEx 42466->42467 42468 7ff657090815 ReadFile 42467->42468 42469 7ff6570907d5 GetLastError 42467->42469 42470 7ff65709083d GetLastError 42468->42470 42473 7ff65709087d 42468->42473 42469->42471 42479 7ff657090871 _cwprintf_s_l 42470->42479 42471->42445 42509 7ff657086a48 GetProcessHeap RtlFreeHeap 42471->42509 42474 7ff6570f3090 GetFileSizeEx GetLastError 42473->42474 42473->42479 42475 7ff657090971 42474->42475 42476 7ff657086828 _cwprintf_s_l GetProcessHeap HeapAlloc 42475->42476 42475->42479 42477 7ff6570909fc memcpy_s 42476->42477 42478 7ff65708fecc GetModuleHandleW GetLastError 42477->42478 42477->42479 42478->42479 42479->42471 42512 7ff6570f1788 42480->42512 42485 7ff6570a4e12 _cwprintf_s_l 42487 7ff6570a505f 42485->42487 42564 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42485->42564 42487->42089 42488 7ff6570a4e90 42488->42485 42528 7ff6570f69b4 42488->42528 42491 7ff6570a4f35 42496 7ff6570a4f21 42491->42496 42563 7ff6570e7f80 77 API calls 3 library calls 42491->42563 42492 7ff6570a4ed0 42492->42485 42492->42491 42494 7ff6570a4f19 42492->42494 42495 7ff657084ab4 2 API calls 42494->42495 42495->42496 42496->42485 42537 7ff6570f0d4c 42496->42537 42499 7ff6570f1788 77 API calls 42500 7ff6570a4fc2 42499->42500 42501 7ff657084be0 2 API calls 42500->42501 42502 7ff6570a4fee 42501->42502 42503 7ff657084ab4 2 API calls 42502->42503 42504 7ff6570a501a 42503->42504 42550 7ff6570a191c 42504->42550 42506->42414 42507->42406 42510 7ff657086a6b GetLastError 42509->42510 42511 7ff657086a7f 42509->42511 42510->42511 42511->42445 42515 7ff6570f17c8 42512->42515 42516 7ff6570f1ae0 _cwprintf_s_l 42515->42516 42565 7ff6570f1c08 42515->42565 42518 7ff6570f1be7 42516->42518 42577 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42516->42577 42519 7ff6570d3b50 _log10_special 8 API calls 42518->42519 42521 7ff6570a4e0c 42519->42521 42521->42485 42522 7ff657084be0 42521->42522 42615 7ff657084bfc 42522->42615 42524 7ff657084bf6 42524->42485 42525 7ff657084ab4 42524->42525 42526 7ff6570844c4 _cwprintf_s_l 2 API calls 42525->42526 42527 7ff657084adf _cwprintf_s_l 42526->42527 42527->42488 42619 7ff6570f67d0 42528->42619 42532 7ff6570f6a98 RegCloseKey 42533 7ff6570f6a26 42532->42533 42536 7ff6570f6aba 42533->42536 42629 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42533->42629 42535 7ff6570f69ee _cwprintf_s_l 42535->42532 42535->42533 42536->42492 42538 7ff6570f0d93 _cwprintf_s_l 42537->42538 42539 7ff6570f0d76 42537->42539 42544 7ff6570f0e93 42538->42544 42657 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42538->42657 42539->42538 42638 7ff6570f0a94 42539->42638 42542 7ff6570f0a94 77 API calls 42543 7ff6570f0db6 42542->42543 42543->42538 42545 7ff6570f0dcd CompareStringW 42543->42545 42548 7ff6570a4f90 42544->42548 42658 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42544->42658 42545->42538 42546 7ff6570f0df7 GetLastError 42545->42546 42546->42538 42548->42485 42548->42499 42665 7ff65708608c 42550->42665 42552 7ff6570a1947 42553 7ff657084ab4 2 API calls 42552->42553 42555 7ff6570a194d _cwprintf_s_l 42552->42555 42554 7ff6570a1968 42553->42554 42554->42555 42676 7ff6570a16e8 42554->42676 42556 7ff6570a1a1b 42555->42556 42700 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42555->42700 42556->42485 42563->42496 42564->42487 42578 7ff657081a28 42565->42578 42567 7ff6570f1c38 42568 7ff6570f1c7f GetProcAddress 42567->42568 42574 7ff6570f1c41 _cwprintf_s_l 42567->42574 42573 7ff6570f1cbc 42568->42573 42568->42574 42569 7ff6570f1d62 CoTaskMemFree 42570 7ff6570f1d68 42569->42570 42571 7ff6570f1d72 FreeLibrary 42570->42571 42572 7ff6570f1b69 42570->42572 42571->42572 42572->42516 42576 7ff6570f1538 11 API calls 2 library calls 42572->42576 42573->42574 42575 7ff657084ab4 2 API calls 42573->42575 42574->42569 42574->42570 42575->42574 42576->42516 42577->42518 42586 7ff6570814ac 42578->42586 42581 7ff657081ac4 42592 7ff657081ae4 42581->42592 42582 7ff657081a50 LoadLibraryExW 42583 7ff657081a66 GetLastError 42582->42583 42585 7ff657081a9c _cwprintf_s_l 42582->42585 42583->42585 42585->42567 42587 7ff657081569 42586->42587 42588 7ff6570814bf GetModuleHandleW 42586->42588 42587->42581 42587->42582 42589 7ff6570814d4 GetLastError 42588->42589 42590 7ff657081531 GetProcAddress GetProcAddress 42588->42590 42591 7ff657081506 _cwprintf_s_l 42589->42591 42590->42587 42591->42587 42602 7ff6570859f0 42592->42602 42594 7ff657081b15 42595 7ff657081b1b _cwprintf_s_l 42594->42595 42596 7ff6570831dc __swprintf_l 61 API calls 42594->42596 42600 7ff657081c21 42595->42600 42614 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42595->42614 42597 7ff657081b62 42596->42597 42597->42595 42598 7ff657081b9a LoadLibraryExW 42597->42598 42598->42595 42599 7ff657081bb3 GetLastError 42598->42599 42599->42595 42600->42585 42603 7ff657085a18 42602->42603 42605 7ff657085a21 42602->42605 42604 7ff6570844c4 _cwprintf_s_l 2 API calls 42603->42604 42604->42605 42606 7ff657085a48 GetSystemDirectoryW 42605->42606 42613 7ff657085a27 _cwprintf_s_l 42605->42613 42607 7ff657085a59 GetLastError 42606->42607 42609 7ff657085ac1 42606->42609 42607->42613 42608 7ff657084ab4 2 API calls 42608->42613 42610 7ff657085ae4 GetSystemDirectoryW 42609->42610 42611 7ff657085b33 42609->42611 42609->42613 42610->42611 42612 7ff657085af3 GetLastError 42610->42612 42611->42608 42611->42613 42612->42613 42613->42594 42614->42600 42616 7ff657084c74 _cwprintf_s_l 42615->42616 42617 7ff657084c2d 42615->42617 42616->42524 42617->42616 42618 7ff657084ab4 2 API calls 42617->42618 42618->42616 42620 7ff657084be0 2 API calls 42619->42620 42621 7ff6570f67f7 42620->42621 42622 7ff6570f67fd _cwprintf_s_l 42621->42622 42630 7ff6570ea65c 42621->42630 42624 7ff6570f6894 42622->42624 42633 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42622->42633 42624->42533 42624->42535 42628 7ff6570ea904 15 API calls _cwprintf_s_l 42624->42628 42627 7ff6570f687b RegCloseKey 42627->42622 42628->42535 42629->42536 42634 7ff6570ea674 42630->42634 42632 7ff6570ea66d 42632->42622 42632->42627 42633->42624 42635 7ff6570ea691 RegOpenKeyExW 42634->42635 42637 7ff6570ea6d1 _cwprintf_s_l 42635->42637 42637->42632 42639 7ff6570f0ad0 42638->42639 42641 7ff6570f0bb7 42639->42641 42642 7ff6570f0b47 42639->42642 42656 7ff6570f0ad6 _cwprintf_s_l 42639->42656 42640 7ff6570f0c9f 42640->42538 42640->42542 42653 7ff6570f0b7c 42641->42653 42661 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42641->42661 42644 7ff6570f0b64 42642->42644 42645 7ff6570f0b50 42642->42645 42644->42653 42660 7ff6570f0cbc GetLastError _cwprintf_s_l 42644->42660 42659 7ff6570f08a8 76 API calls _cwprintf_s_l 42645->42659 42648 7ff6570f0be6 42651 7ff6570f0c0b 42648->42651 42654 7ff657084ab4 2 API calls 42648->42654 42649 7ff6570f0b60 42649->42644 42651->42656 42663 7ff657086424 58 API calls 4 library calls 42651->42663 42653->42648 42653->42656 42662 7ff6570835ac 58 API calls 3 library calls 42653->42662 42654->42651 42656->42640 42664 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42656->42664 42657->42544 42658->42548 42659->42649 42660->42653 42661->42653 42662->42648 42663->42656 42664->42640 42666 7ff6570860bb 42665->42666 42667 7ff6570860c4 42665->42667 42668 7ff6570844c4 _cwprintf_s_l 2 API calls 42666->42668 42669 7ff657081a28 73 API calls 42667->42669 42671 7ff6570860ca _cwprintf_s_l 42667->42671 42668->42667 42670 7ff6570860ff 42669->42670 42670->42671 42672 7ff65708613c GetProcAddress 42670->42672 42671->42552 42675 7ff65708615f 42672->42675 42673 7ff6570861d7 GetLastError 42674 7ff657086195 _cwprintf_s_l 42673->42674 42674->42671 42675->42673 42675->42674 42701 7ff65708686c 42676->42701 42678 7ff6570a172d 42680 7ff6570a177d 42678->42680 42682 7ff6570a1733 _cwprintf_s_l 42678->42682 42748 7ff6570850b4 66 API calls _cwprintf_s_l 42678->42748 42680->42682 42710 7ff6570f6aec 42680->42710 42683 7ff6570a18f5 42682->42683 42755 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42682->42755 42685 7ff6570a1903 42683->42685 42756 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42683->42756 42685->42555 42691 7ff6570f5bf0 UuidCreate 42685->42691 42686 7ff6570a1807 42686->42682 42690 7ff6570a183b 42686->42690 42749 7ff6570f5f8c 42686->42749 42690->42682 42719 7ff6570f64c8 42690->42719 42692 7ff6570f5c37 StringFromGUID2 42691->42692 42693 7ff6570f5c29 _cwprintf_s_l 42691->42693 42692->42693 42694 7ff6570d3b50 _log10_special 8 API calls 42693->42694 42695 7ff6570a19a9 42694->42695 42695->42555 42696 7ff6570f1050 42695->42696 42697 7ff6570f106d 42696->42697 42699 7ff6570f1071 _cwprintf_s_l 42697->42699 42808 7ff6570f0eb8 77 API calls _cwprintf_s_l 42697->42808 42699->42555 42700->42556 42702 7ff657086899 42701->42702 42706 7ff6570868cf _cwprintf_s_l 42701->42706 42703 7ff6570868bc 42702->42703 42704 7ff65708694a GetProcessHeap HeapAlloc 42702->42704 42702->42706 42757 7ff657086f2c GetProcessHeap HeapSize _cwprintf_s_l 42703->42757 42705 7ff657086966 _cwprintf_s_l 42704->42705 42704->42706 42705->42706 42706->42678 42708 7ff6570868c9 42708->42706 42758 7ff657086ba0 GetProcessHeap HeapReAlloc 42708->42758 42711 7ff6570f67d0 7 API calls 42710->42711 42712 7ff6570f6b25 42711->42712 42715 7ff6570f6b6b 42712->42715 42718 7ff6570f6b33 _cwprintf_s_l 42712->42718 42759 7ff6570eac2c 42712->42759 42714 7ff6570f6be3 RegCloseKey 42714->42715 42717 7ff6570f6c05 42715->42717 42765 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42715->42765 42717->42686 42718->42714 42718->42715 42720 7ff657081a28 73 API calls 42719->42720 42721 7ff6570f6504 42720->42721 42722 7ff6570f653a GetProcAddress 42721->42722 42745 7ff6570f650a _cwprintf_s_l 42721->42745 42723 7ff6570f655f GetCurrentProcess 42722->42723 42724 7ff6570f65ca 42722->42724 42799 7ff6570e96bc 13 API calls _cwprintf_s_l 42723->42799 42725 7ff6570ea65c RegOpenKeyExW 42724->42725 42724->42745 42731 7ff6570f6613 42725->42731 42727 7ff6570f6571 42727->42724 42727->42745 42800 7ff6570f1370 81 API calls _cwprintf_s_l 42727->42800 42728 7ff6570f67a3 RegCloseKey 42729 7ff6570f67ae 42728->42729 42730 7ff6570f67bc 42729->42730 42806 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42729->42806 42730->42682 42734 7ff6570f6705 42731->42734 42790 7ff6570f63b0 42731->42790 42804 7ff6570f1370 81 API calls _cwprintf_s_l 42734->42804 42735 7ff6570f659b 42735->42745 42801 7ff6570869ec 6 API calls _cwprintf_s_l 42735->42801 42740 7ff6570f6742 42805 7ff6570869ec 6 API calls _cwprintf_s_l 42740->42805 42741 7ff6570f6691 42744 7ff6570f63b0 16 API calls 42741->42744 42746 7ff6570f66d1 42744->42746 42745->42728 42745->42729 42746->42734 42803 7ff6570869ec 6 API calls _cwprintf_s_l 42746->42803 42748->42680 42750 7ff6570f5fc7 42749->42750 42752 7ff6570f5fd0 42749->42752 42751 7ff6570844c4 _cwprintf_s_l 2 API calls 42750->42751 42751->42752 42753 7ff6570f6031 GetLastError 42752->42753 42754 7ff6570f5fd6 _cwprintf_s_l 42752->42754 42753->42752 42753->42754 42754->42690 42755->42683 42756->42685 42757->42708 42760 7ff6570eac6f 42759->42760 42761 7ff6570eac5e 42759->42761 42764 7ff6570eac75 _cwprintf_s_l 42760->42764 42766 7ff6570ead6c 42760->42766 42761->42760 42781 7ff657086f2c GetProcessHeap HeapSize _cwprintf_s_l 42761->42781 42764->42718 42765->42717 42782 7ff6570e9a7c 42766->42782 42768 7ff6570eadd3 _cwprintf_s_l 42769 7ff6570eaf49 42768->42769 42789 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42768->42789 42769->42764 42771 7ff6570eadb9 42771->42768 42773 7ff6570eae72 42771->42773 42777 7ff6570e9a7c RegQueryValueExW 42771->42777 42786 7ff657086ba0 GetProcessHeap HeapReAlloc 42771->42786 42787 7ff657086828 GetProcessHeap HeapAlloc 42771->42787 42773->42768 42788 7ff657086f9c 6 API calls _cwprintf_s_l 42773->42788 42776 7ff6570eaed6 42776->42768 42778 7ff6570eaf0e lstrlenW 42776->42778 42777->42771 42778->42769 42779 7ff6570eaf32 42778->42779 42780 7ff657086a48 _cwprintf_s_l 3 API calls 42779->42780 42780->42768 42781->42760 42783 7ff6570e9aa5 42782->42783 42784 7ff6570e9b01 RegQueryValueExW 42783->42784 42785 7ff6570e9aba 42783->42785 42784->42785 42785->42771 42788->42776 42789->42769 42791 7ff6570eac2c 15 API calls 42790->42791 42792 7ff6570f63dc 42791->42792 42794 7ff6570f5f8c 3 API calls 42792->42794 42796 7ff6570f642b 42792->42796 42797 7ff6570f63f8 _cwprintf_s_l 42792->42797 42793 7ff6570f64b5 42793->42741 42802 7ff6570869ec 6 API calls _cwprintf_s_l 42793->42802 42794->42796 42796->42797 42798 7ff657084ab4 2 API calls 42796->42798 42797->42793 42807 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42797->42807 42798->42797 42799->42727 42800->42735 42801->42724 42802->42741 42803->42734 42804->42740 42805->42745 42806->42730 42807->42793 42808->42699 42810 7ff6570f315e 42809->42810 42811 7ff6570f31c4 GlobalAlloc 42810->42811 42812 7ff6570f3164 GetLastError 42810->42812 42813 7ff6570f317c _cwprintf_s_l 42811->42813 42814 7ff6570f31fb 42811->42814 42812->42811 42812->42813 42813->42124 42815 7ff6570f3214 GetLastError 42814->42815 42816 7ff6570f3271 42814->42816 42815->42816 42819 7ff6570f322c _cwprintf_s_l 42815->42819 42817 7ff6570f328e GetLastError 42816->42817 42816->42819 42817->42819 42818 7ff6570f32d6 GlobalFree 42818->42813 42819->42818 42820->42130 42822 7ff6570e8448 42821->42822 42823 7ff657089747 42822->42823 42825 7ff6570e7928 FormatMessageW 42822->42825 42823->42034 42823->42261 42826 7ff6570e7975 GetLastError 42825->42826 42827 7ff6570e79cf 42825->42827 42826->42827 42828 7ff6570e798d _cwprintf_s_l 42826->42828 42829 7ff6570e7a38 __swprintf_l 74 API calls 42827->42829 42830 7ff6570e7a21 42828->42830 42831 7ff6570e7a1b LocalFree 42828->42831 42829->42828 42830->42823 42831->42830 42834 7ff65708d4d9 _cwprintf_s_l 42832->42834 42836 7ff65708d5db _cwprintf_s_l 42834->42836 42841 7ff65708d6e0 _cwprintf_s_l 42834->42841 42884 7ff657089b6c 42834->42884 42889 7ff65708bbfc 42834->42889 42837 7ff657089b6c 2 API calls 42836->42837 42840 7ff65708bbfc 4 API calls 42836->42840 42836->42841 42837->42836 42838 7ff6570d3b50 _log10_special 8 API calls 42839 7ff65708d77e 42838->42839 42839->42184 42842 7ff657091758 42839->42842 42840->42836 42841->42838 42843 7ff65709178a memcpy_s 42842->42843 42844 7ff65708543c 10 API calls 42843->42844 42846 7ff6570917c7 _cwprintf_s_l 42843->42846 42845 7ff6570917e0 42844->42845 42845->42846 42898 7ff657091534 42845->42898 42848 7ff657091848 42846->42848 42910 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42846->42910 42848->42184 42850 7ff657091514 42848->42850 42851 7ff657091521 42850->42851 42852 7ff657091526 42850->42852 42923 7ff6570b7904 8 API calls _cwprintf_s_l 42851->42923 42852->42184 42854 7ff657091884 42852->42854 42855 7ff657091891 42854->42855 42856 7ff657091899 42854->42856 42855->42184 42858 7ff6570d0600 42855->42858 42924 7ff6570b7b4c 8 API calls _cwprintf_s_l 42856->42924 42925 7ff6570eeec0 42858->42925 42862 7ff6570d0623 _cwprintf_s_l 42862->42172 42864 7ff657091425 42863->42864 42865 7ff65709145b 42863->42865 42945 7ff6570b77f0 10 API calls _cwprintf_s_l 42864->42945 42867 7ff65709146e memcpy_s 42865->42867 42868 7ff657091461 CloseHandle 42865->42868 42867->42162 42868->42867 42869 7ff65709142a _cwprintf_s_l 42869->42865 42870->42174 42871->42184 42872->42181 42873->42183 42874->42187 42946 7ff65708be2c EnterCriticalSection 42875->42946 42878->42193 42879->42196 42880->42200 42881->42157 42882->42164 42883->42165 42885 7ff657089b97 42884->42885 42886 7ff657089b9f CompareStringW 42885->42886 42887 7ff657089c27 _cwprintf_s_l 42885->42887 42888 7ff657089bf3 GetLastError 42885->42888 42886->42885 42887->42834 42888->42887 42890 7ff65708bc2f 42889->42890 42894 7ff65708bc4a _cwprintf_s_l memcpy_s 42889->42894 42891 7ff65708bde6 42890->42891 42892 7ff65708bc7d 42890->42892 42890->42894 42897 7ff657086828 GetProcessHeap HeapAlloc 42891->42897 42892->42894 42896 7ff657086ba0 GetProcessHeap HeapReAlloc 42892->42896 42894->42834 42899 7ff65709161f GetCurrentProcess GetCurrentProcess DuplicateHandle 42898->42899 42900 7ff657091581 CreateFileW 42898->42900 42901 7ff657091654 GetLastError 42899->42901 42904 7ff657091694 SetFilePointerEx 42899->42904 42902 7ff6570915b7 GetLastError 42900->42902 42900->42904 42903 7ff6570915f2 _cwprintf_s_l 42901->42903 42906 7ff6570915eb _cwprintf_s_l 42902->42906 42903->42846 42907 7ff6570916f2 42904->42907 42908 7ff6570916b3 GetLastError 42904->42908 42906->42903 42907->42903 42911 7ff6570b7964 42907->42911 42908->42903 42910->42848 42912 7ff6570b7982 42911->42912 42913 7ff6570b7999 CreateEventW 42912->42913 42918 7ff6570b7988 _cwprintf_s_l 42912->42918 42914 7ff6570b79f8 CreateEventW 42913->42914 42915 7ff6570b79b6 GetLastError 42913->42915 42916 7ff6570b7a11 GetLastError 42914->42916 42917 7ff6570b7a4e CreateThread 42914->42917 42915->42918 42916->42918 42919 7ff6570b7ab6 42917->42919 42920 7ff6570b7a76 GetLastError 42917->42920 42918->42903 42922 7ff6570b769c 6 API calls _cwprintf_s_l 42919->42922 42920->42918 42922->42918 42923->42852 42924->42855 42926 7ff6570d47d0 memcpy_s 42925->42926 42927 7ff6570eef0a VariantInit 42926->42927 42933 7ff6570ee4b8 GetModuleHandleA 42927->42933 42929 7ff6570d3b50 _log10_special 8 API calls 42930 7ff6570d061d 42929->42930 42930->42862 42932 7ff6570d0288 205 API calls _cwprintf_s_l 42930->42932 42931 7ff6570eef27 _cwprintf_s_l 42931->42929 42932->42862 42934 7ff6570ee5af GetProcAddress 42933->42934 42935 7ff6570ee509 GetLastError 42933->42935 42936 7ff6570ee5c4 GetProcAddress GetProcAddress GetProcAddress 42934->42936 42937 7ff6570ee62b CoCreateInstance 42934->42937 42939 7ff6570ee53d _cwprintf_s_l 42935->42939 42941 7ff6570ee602 42936->42941 42938 7ff6570ee684 42937->42938 42942 7ff6570ee654 _cwprintf_s_l 42937->42942 42938->42942 42944 7ff6570ee764 SysAllocString SysFreeString _cwprintf_s_l 42938->42944 42939->42931 42941->42937 42942->42939 42943 7ff6570ee759 ExitProcess 42942->42943 42944->42942 42945->42869 42947 7ff657089b6c 2 API calls 42946->42947 42948 7ff65708be6a 42947->42948 42949 7ff65708bbfc 4 API calls 42948->42949 42955 7ff65708be76 _cwprintf_s_l 42948->42955 42958 7ff65708be9f 42948->42958 42949->42958 42950 7ff65708c022 42968 7ff6570b6394 11 API calls _cwprintf_s_l 42950->42968 42951 7ff65708c074 LeaveCriticalSection 42953 7ff65708c081 42951->42953 42954 7ff65708c0a2 42951->42954 42953->42954 42956 7ff65708c0c0 _cwprintf_s_l 78 API calls 42953->42956 42954->42186 42955->42951 42956->42954 42957 7ff65708bfab 42961 7ff65708bfb3 42957->42961 42966 7ff65708bf42 42957->42966 42958->42950 42958->42955 42958->42957 42959 7ff65708bf88 42958->42959 42962 7ff65708bf68 42958->42962 42958->42966 42965 7ff65708c0c0 _cwprintf_s_l 78 API calls 42959->42965 42960 7ff65708c0c0 _cwprintf_s_l 78 API calls 42964 7ff65708bfa9 42960->42964 42963 7ff65708c0c0 _cwprintf_s_l 78 API calls 42961->42963 42962->42959 42962->42964 42962->42966 42963->42964 42964->42950 42967 7ff657089b38 77 API calls 42964->42967 42965->42964 42966->42960 42966->42964 42967->42950 42968->42955 42970 7ff65709ebd7 42969->42970 42971 7ff6570ea65c RegOpenKeyExW 42970->42971 42972 7ff65709ec22 42971->42972 42974 7ff65709ec3a 42972->42974 43092 7ff6570ea904 15 API calls _cwprintf_s_l 42972->43092 42975 7ff65709ec8f 42974->42975 43093 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42974->43093 42977 7ff65709ec98 RegCloseKey 42975->42977 42978 7ff65709eca2 _cwprintf_s_l 42975->42978 42977->42978 42979 7ff6570e87d0 78 API calls 42978->42979 42987 7ff65709ed58 42978->42987 42999 7ff65709ecfd _cwprintf_s_l 42978->42999 42979->42987 42980 7ff65709ef19 42990 7ff65709ef3a 42980->42990 43059 7ff65708c5ac 42980->43059 42981 7ff65709edfc Sleep 42991 7ff65709edf2 42981->42991 42984 7ff65709f0a4 42989 7ff657084578 5 API calls 42984->42989 42986 7ff6570e84ac 132 API calls 42986->42991 42987->42980 42987->42991 42987->42999 42992 7ff657088ed8 42989->42992 42996 7ff65709efe2 42990->42996 43000 7ff65709ef70 42990->43000 43097 7ff65709e610 78 API calls 2 library calls 42990->43097 42991->42981 42991->42986 42994 7ff65709ee45 42991->42994 42992->42205 42992->42227 42995 7ff65709ee4d 42994->42995 43007 7ff65709ee5e 42994->43007 43094 7ff6570e7f04 6 API calls _cwprintf_s_l 42995->43094 43098 7ff6570e7f04 6 API calls _cwprintf_s_l 42996->43098 42999->42984 43099 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 42999->43099 43000->42996 43000->42999 43062 7ff6570e84ac EnterCriticalSection 43000->43062 43002 7ff65709f027 43002->42999 43005 7ff65708db80 87 API calls 43002->43005 43005->42999 43007->42999 43007->43002 43095 7ff6570b586c 62 API calls _cwprintf_s_l 43007->43095 43009 7ff65708543c 10 API calls 43008->43009 43010 7ff6570a39e5 43009->43010 43011 7ff6570a39eb _cwprintf_s_l 43010->43011 43185 7ff6570a1a34 43010->43185 43013 7ff6570a3a66 43011->43013 43202 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 43011->43202 43013->42217 43016 7ff6570831dc __swprintf_l 61 API calls 43015->43016 43017 7ff6570a9d6b 43016->43017 43026 7ff6570a9d71 _cwprintf_s_l 43017->43026 43262 7ff6570a91e0 GetCurrentProcess GetCurrentProcess DuplicateHandle 43017->43262 43023 7ff6570a9e1c 43023->43026 43027 7ff6570a9e86 43023->43027 43278 7ff6570830a4 61 API calls 2 library calls 43023->43278 43025 7ff6570a9e60 43025->43026 43279 7ff657081570 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 43025->43279 43026->42221 43030 7ff6570a9ecf _cwprintf_s_l 43027->43030 43280 7ff657081570 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 43027->43280 43030->43026 43031 7ff6570a9ffb 43030->43031 43281 7ff657081570 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 43030->43281 43031->43026 43032 7ff6570aa04f 43031->43032 43282 7ff6570830a4 61 API calls 2 library calls 43031->43282 43032->43026 43034 7ff6570aa082 43032->43034 43283 7ff6570830a4 61 API calls 2 library calls 43032->43283 43034->43026 43284 7ff6570a807c 61 API calls 2 library calls 43034->43284 43039 7ff657081e3c __swprintf_l 61 API calls 43038->43039 43040 7ff657083248 43039->43040 43040->42227 43041 7ff6570aa168 43040->43041 43043 7ff6570aa1a1 memcpy_s 43041->43043 43042 7ff6570aa1ce CreateProcessW 43044 7ff6570aa22c GetLastError 43042->43044 43045 7ff6570aa263 _cwprintf_s_l 43042->43045 43043->43042 43044->43045 43045->42231 43047 7ff6570818f4 2 API calls 43046->43047 43048 7ff6570e976a 43047->43048 43049 7ff6570e97af GetExitCodeProcess 43048->43049 43050 7ff6570e977d _cwprintf_s_l 43048->43050 43049->43050 43051 7ff6570e97bf GetLastError 43049->43051 43050->42227 43051->43050 43288 7ff6570845a8 43052->43288 43054 7ff65708458a 43055 7ff657084599 43054->43055 43292 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 43054->43292 43055->42226 43057->42230 43058->42233 43100 7ff657089c84 EnterCriticalSection 43059->43100 43063 7ff6570e84f0 43062->43063 43064 7ff6570e8539 43062->43064 43063->43064 43065 7ff6570e84f6 43063->43065 43066 7ff657084be0 2 API calls 43064->43066 43132 7ff657084d48 43065->43132 43069 7ff6570e8548 43066->43069 43068 7ff6570e851f 43070 7ff6570e86d5 43068->43070 43071 7ff6570e86d0 43068->43071 43086 7ff6570e8529 _cwprintf_s_l 43068->43086 43082 7ff6570e8584 43069->43082 43069->43086 43162 7ff6570850b4 66 API calls _cwprintf_s_l 43069->43162 43076 7ff6570e887c __swprintf_l 10 API calls 43070->43076 43070->43086 43176 7ff6570e826c 95 API calls 3 library calls 43071->43176 43072 7ff6570e8747 LeaveCriticalSection 43075 7ff6570e875d 43072->43075 43079 7ff6570e8762 43072->43079 43178 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 43075->43178 43081 7ff6570e86e6 43076->43081 43078 7ff65709efd4 43078->42996 43096 7ff6570e7f04 6 API calls _cwprintf_s_l 43078->43096 43079->43078 43179 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 43079->43179 43081->43086 43177 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 43081->43177 43082->43086 43163 7ff6570879e8 CreateDirectoryW 43082->43163 43085 7ff6570e85dc 43085->43086 43087 7ff6570e861b CreateFileW 43085->43087 43086->43072 43088 7ff6570e86a7 43087->43088 43089 7ff6570e865f GetLastError 43087->43089 43088->43068 43091 7ff6570e86b2 SetFilePointer 43088->43091 43089->43088 43090 7ff6570e8677 _cwprintf_s_l 43089->43090 43090->43086 43091->43068 43092->42974 43093->42975 43095->43007 43097->43000 43099->42984 43122 7ff657089cd8 43100->43122 43101 7ff65708a43d LeaveCriticalSection 43102 7ff65708a482 43101->43102 43110 7ff65708a44e 43101->43110 43105 7ff65708a4b2 43102->43105 43106 7ff65708a494 43102->43106 43103 7ff65708a47a 43104 7ff657086a48 _cwprintf_s_l 3 API calls 43103->43104 43104->43102 43108 7ff657084578 5 API calls 43105->43108 43107 7ff65708a4a2 43106->43107 43130 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 43106->43130 43111 7ff65708a4b0 43107->43111 43131 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 43107->43131 43113 7ff65708a4b9 43108->43113 43110->43103 43112 7ff657084578 5 API calls 43110->43112 43129 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 43110->43129 43111->42990 43112->43110 43116 7ff657084578 5 API calls 43113->43116 43117 7ff65708a4c2 43116->43117 43118 7ff657084578 5 API calls 43117->43118 43118->43111 43124 7ff657089d22 _cwprintf_s_l 43122->43124 43125 7ff657086ba0 GetProcessHeap HeapReAlloc 43122->43125 43126 7ff657086828 GetProcessHeap HeapAlloc 43122->43126 43127 7ff65708d7a0 CompareStringW GetLastError EnterCriticalSection LeaveCriticalSection _cwprintf_s_l 43122->43127 43128 7ff65708a4e0 69 API calls _cwprintf_s_l 43122->43128 43124->43101 43127->43122 43128->43122 43129->43110 43130->43107 43131->43111 43133 7ff657084dfd 43132->43133 43134 7ff657084dab 43132->43134 43136 7ff65708608c 75 API calls 43133->43136 43134->43133 43135 7ff657084db1 43134->43135 43137 7ff657084bfc 2 API calls 43135->43137 43138 7ff657084e08 43136->43138 43140 7ff657084dc7 43137->43140 43139 7ff657084bfc 2 API calls 43138->43139 43141 7ff657084dcd _cwprintf_s_l 43138->43141 43139->43140 43140->43141 43142 7ff657084e66 43140->43142 43143 7ff6570879e8 5 API calls 43140->43143 43144 7ff657085067 43141->43144 43180 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 43141->43180 43142->43141 43145 7ff657084ebb GetLocalTime 43142->43145 43151 7ff657084f41 CreateFileW 43142->43151 43152 7ff657084fc8 _cwprintf_s_l 43142->43152 43158 7ff657084f87 Sleep 43142->43158 43143->43142 43148 7ff657085075 43144->43148 43181 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 43144->43181 43146 7ff6570831dc __swprintf_l 61 API calls 43145->43146 43146->43142 43153 7ff657085083 43148->43153 43182 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 43148->43182 43151->43152 43155 7ff657084f75 GetLastError 43151->43155 43152->43141 43161 7ff657085050 CloseHandle 43152->43161 43154 7ff657085091 43153->43154 43183 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 43153->43183 43157 7ff6570d3b50 _log10_special 8 API calls 43154->43157 43155->43142 43155->43158 43159 7ff65708509f 43157->43159 43158->43142 43160 7ff657084f9a 43158->43160 43159->43068 43160->43142 43161->43141 43162->43082 43164 7ff657087a1a GetLastError 43163->43164 43174 7ff657087a96 _cwprintf_s_l 43163->43174 43165 7ff657087a2b 43164->43165 43164->43174 43166 7ff657087a30 43165->43166 43169 7ff657087a42 43165->43169 43184 7ff657087b5c GetFileAttributesW 43166->43184 43168 7ff657087a3a 43168->43169 43168->43174 43170 7ff6570879e8 GetFileAttributesW 43169->43170 43169->43174 43171 7ff657087a8c 43170->43171 43172 7ff657087ac6 CreateDirectoryW 43171->43172 43171->43174 43173 7ff657087ad6 GetLastError 43172->43173 43175 7ff657087ae3 43172->43175 43173->43175 43174->43085 43175->43174 43176->43070 43177->43086 43178->43079 43179->43078 43180->43144 43181->43148 43182->43153 43183->43154 43184->43168 43203 7ff6570a44cc 43185->43203 43188 7ff6570f1050 77 API calls 43189 7ff6570a1a97 43188->43189 43190 7ff6570879e8 5 API calls 43189->43190 43201 7ff6570a1a76 _cwprintf_s_l 43189->43201 43192 7ff6570a1ab9 43190->43192 43191 7ff6570a1ba6 43196 7ff6570a1bb4 43191->43196 43242 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 43191->43242 43197 7ff6570f1050 77 API calls 43192->43197 43192->43201 43195 7ff6570a1bc2 43195->43011 43196->43195 43243 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 43196->43243 43199 7ff6570a1ae0 43197->43199 43199->43201 43213 7ff6570a1be0 CreateFileW 43199->43213 43201->43191 43241 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 43201->43241 43202->43013 43204 7ff6570a45aa DecryptFileW 43203->43204 43208 7ff6570a44f7 43203->43208 43210 7ff6570a457a _cwprintf_s_l 43204->43210 43205 7ff6570a1a70 43205->43188 43205->43201 43206 7ff6570f1050 77 API calls 43206->43208 43208->43206 43211 7ff6570879e8 5 API calls 43208->43211 43212 7ff6570a455e 43208->43212 43244 7ff6570e7f80 77 API calls 3 library calls 43208->43244 43210->43205 43245 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 43210->43245 43211->43208 43212->43204 43212->43210 43214 7ff6570a1cb0 43213->43214 43215 7ff6570a1c4b GetLastError 43213->43215 43246 7ff6570f2e84 SetFilePointerEx 43214->43246 43219 7ff6570a1c7f _cwprintf_s_l 43215->43219 43217 7ff6570a1cc0 43227 7ff6570a1cc6 _cwprintf_s_l 43217->43227 43249 7ff6570f1d8c 43217->43249 43222 7ff6570d3b50 _log10_special 8 API calls 43219->43222 43221 7ff6570a1f12 CloseHandle 43221->43219 43224 7ff6570a1f2a 43222->43224 43223 7ff6570a1d55 SetFilePointerEx 43225 7ff6570a1d6b GetLastError 43223->43225 43226 7ff6570a1dad 43223->43226 43224->43201 43225->43227 43257 7ff6570f35ec 43226->43257 43227->43221 43229 7ff6570a1dc2 43229->43227 43230 7ff6570a1dd9 SetFilePointerEx 43229->43230 43231 7ff6570a1e2f 43230->43231 43232 7ff6570a1def GetLastError 43230->43232 43233 7ff6570f35ec 2 API calls 43231->43233 43232->43227 43234 7ff6570a1e3e 43233->43234 43234->43227 43235 7ff6570f35ec 2 API calls 43234->43235 43236 7ff6570a1e64 43235->43236 43236->43227 43237 7ff6570a1e78 SetFilePointerEx 43236->43237 43238 7ff6570a1ec3 _cwprintf_s_l 43237->43238 43239 7ff6570a1e8f GetLastError 43237->43239 43240 7ff6570f35ec 2 API calls 43238->43240 43239->43238 43240->43227 43241->43191 43242->43196 43243->43195 43244->43208 43245->43205 43247 7ff6570f2ed8 _cwprintf_s_l 43246->43247 43248 7ff6570f2ea2 GetLastError 43246->43248 43247->43217 43248->43247 43253 7ff6570f1da1 43249->43253 43250 7ff6570f1dcc ReadFile 43251 7ff6570f1e50 GetLastError 43250->43251 43250->43253 43255 7ff6570f1e38 _cwprintf_s_l 43251->43255 43252 7ff6570f35ec 2 API calls 43252->43253 43253->43250 43253->43252 43253->43255 43254 7ff6570d3b50 _log10_special 8 API calls 43256 7ff6570a1d0c 43254->43256 43255->43254 43256->43221 43256->43223 43256->43227 43260 7ff6570f361d 43257->43260 43261 7ff6570f366f _cwprintf_s_l 43257->43261 43258 7ff6570f3623 WriteFile 43259 7ff6570f3649 GetLastError 43258->43259 43258->43260 43259->43260 43259->43261 43260->43258 43260->43261 43261->43229 43263 7ff6570a9243 GetLastError 43262->43263 43264 7ff6570a92a8 43262->43264 43265 7ff6570a9277 _cwprintf_s_l 43263->43265 43285 7ff657083138 61 API calls 2 library calls 43264->43285 43267 7ff6570a92f2 43265->43267 43268 7ff6570a92ec CloseHandle 43265->43268 43267->43026 43269 7ff6570a9308 CreateFileW 43267->43269 43268->43267 43270 7ff6570a9410 43269->43270 43271 7ff6570a937a 43269->43271 43270->43026 43277 7ff6570a9430 61 API calls _cwprintf_s_l 43270->43277 43286 7ff657083138 61 API calls 2 library calls 43271->43286 43273 7ff6570a9393 43275 7ff6570a9399 _cwprintf_s_l 43273->43275 43287 7ff6570830a4 61 API calls 2 library calls 43273->43287 43275->43270 43276 7ff6570a9407 CloseHandle 43275->43276 43276->43270 43277->43023 43278->43025 43279->43027 43280->43030 43281->43031 43282->43032 43283->43034 43284->43026 43285->43265 43286->43273 43287->43275 43289 7ff6570845c1 43288->43289 43291 7ff6570845cb _cwprintf_s_l 43288->43291 43293 7ff657086f2c GetProcessHeap HeapSize _cwprintf_s_l 43289->43293 43291->43054 43292->43055 43293->43291 43295 7ff657087301 memcpy_s 43294->43295 43296 7ff65708731f GetFileAttributesW 43295->43296 43297 7ff65708733b GetLastError 43296->43297 43298 7ff6570873be 43296->43298 43320 7ff657087353 _cwprintf_s_l 43297->43320 43299 7ff6570873ca SetFileAttributesW 43298->43299 43300 7ff657087432 43298->43300 43335 7ff65708779d _cwprintf_s_l 43298->43335 43299->43300 43301 7ff6570873dc GetLastError 43299->43301 43302 7ff657087754 RemoveDirectoryW 43300->43302 43303 7ff65708746a 43300->43303 43308 7ff65708608c 75 API calls 43300->43308 43316 7ff6570873f4 _cwprintf_s_l 43301->43316 43307 7ff657087767 GetLastError 43302->43307 43302->43335 43309 7ff657084be0 2 API calls 43303->43309 43303->43320 43304 7ff65708799b 43306 7ff6570879aa 43304->43306 43343 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 43304->43343 43313 7ff6570879b9 43306->43313 43344 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 43306->43344 43312 7ff657087783 43307->43312 43307->43335 43308->43303 43310 7ff6570874b0 FindFirstFileW 43309->43310 43321 7ff6570874ef GetLastError 43310->43321 43340 7ff657087527 _cwprintf_s_l 43310->43340 43317 7ff657087789 MoveFileExW 43312->43317 43312->43335 43319 7ff6570d3b50 _log10_special 8 API calls 43313->43319 43314 7ff657087983 FindClose 43314->43320 43316->43320 43317->43335 43322 7ff6570879ca 43319->43322 43320->43304 43342 7ff657084278 GetProcessHeap RtlFreeHeap GetLastError _cwprintf_s_l 43320->43342 43321->43340 43322->42238 43323 7ff657087729 FindNextFileW 43324 7ff657087743 GetLastError 43323->43324 43323->43340 43325 7ff657087896 GetLastError 43324->43325 43326 7ff657087752 43324->43326 43325->43335 43326->43302 43327 7ff657084be0 2 API calls 43327->43340 43328 7ff65708768c DeleteFileW 43328->43323 43328->43340 43329 7ff657087644 SetFileAttributesW 43329->43328 43331 7ff657087658 GetLastError 43329->43331 43330 7ff657084ab4 2 API calls 43330->43340 43336 7ff657087817 _cwprintf_s_l 43331->43336 43338 7ff657087673 43331->43338 43332 7ff6570876fa GetLastError 43332->43335 43332->43340 43334 7ff6570872ac 80 API calls 43334->43340 43335->43314 43335->43320 43336->43335 43337 7ff6570876c8 MoveFileExW 43337->43338 43339 7ff6570876f2 MoveFileExW 43337->43339 43338->43323 43338->43336 43338->43337 43338->43339 43341 7ff657085d3c 66 API calls 2 library calls 43338->43341 43339->43323 43340->43323 43340->43327 43340->43328 43340->43329 43340->43330 43340->43332 43340->43334 43340->43335 43340->43338 43341->43338 43342->43304 43343->43306 43344->43313 43345->42246 43346->42248 43347->42250 43348->42252 43349->42253 43350->42256 43351->42258 43352 7ff6570db65d 43364 7ff6570dbfb8 43352->43364 43354 7ff6570db662 43355 7ff6570db6d3 43354->43355 43356 7ff6570db689 GetModuleHandleW 43354->43356 43357 7ff6570db560 11 API calls 43355->43357 43356->43355 43362 7ff6570db696 43356->43362 43358 7ff6570db70f 43357->43358 43359 7ff6570db716 43358->43359 43360 7ff6570db72c 11 API calls 43358->43360 43361 7ff6570db728 43360->43361 43362->43355 43363 7ff6570db784 GetModuleHandleExW GetProcAddress FreeLibrary 43362->43363 43363->43355 43369 7ff6570de140 47 API calls 3 library calls 43364->43369 43366 7ff6570dbfc1 43370 7ff6570dc060 47 API calls __GetCurrentState 43366->43370 43369->43366 43440 7ff657087d60 72 API calls 2 library calls 43388 7ff65709845c 8 API calls 2 library calls 41643 7ff6570b6690 41644 7ff6570b66ba 41643->41644 41650 7ff6570b66d6 41643->41650 41645 7ff6570b66ce 41644->41645 41646 7ff6570b66bf 41644->41646 41652 7ff6570b6e7c SetEvent 41645->41652 41647 7ff6570b66c4 41646->41647 41646->41650 41683 7ff6570b6d80 DosDateTimeToFileTime LocalFileTimeToFileTime SetFileTime CloseHandle _cwprintf_s_l 41647->41683 41651 7ff6570b66cc 41651->41650 41653 7ff6570b6ef2 41652->41653 41654 7ff6570b6eb2 GetLastError 41652->41654 41684 7ff6570818f4 WaitForSingleObject 41653->41684 41663 7ff6570b6ee6 _cwprintf_s_l 41654->41663 41656 7ff6570b6efe 41657 7ff6570b6f15 ResetEvent 41656->41657 41656->41663 41658 7ff6570b6f63 41657->41658 41659 7ff6570b6f23 GetLastError 41657->41659 41658->41663 41688 7ff6570837b4 41658->41688 41659->41663 41661 7ff6570b6fc4 41662 7ff6570b7005 SetEvent 41661->41662 41661->41663 41664 7ff6570b7023 41662->41664 41665 7ff6570b7013 GetLastError 41662->41665 41663->41650 41666 7ff6570818f4 2 API calls 41664->41666 41665->41664 41667 7ff6570b702f 41666->41667 41667->41663 41668 7ff6570b7046 ResetEvent 41667->41668 41669 7ff6570b7064 41668->41669 41670 7ff6570b7054 GetLastError 41668->41670 41671 7ff6570b7070 41669->41671 41672 7ff6570b7104 CreateFileW 41669->41672 41670->41669 41671->41663 41703 7ff657086828 GetProcessHeap HeapAlloc 41671->41703 41673 7ff6570b7183 SetFilePointerEx 41672->41673 41674 7ff6570b7138 GetLastError 41672->41674 41675 7ff6570b71d9 SetEndOfFile 41673->41675 41676 7ff6570b7199 GetLastError 41673->41676 41678 7ff6570b716c _cwprintf_s_l 41674->41678 41680 7ff6570b7224 SetFilePointerEx 41675->41680 41681 7ff6570b71e7 GetLastError 41675->41681 41679 7ff6570b71cd _cwprintf_s_l 41676->41679 41678->41673 41679->41663 41680->41663 41682 7ff6570b723a GetLastError 41680->41682 41681->41679 41682->41679 41683->41651 41685 7ff657081913 41684->41685 41687 7ff657081909 _cwprintf_s_l 41684->41687 41686 7ff657081945 GetLastError 41685->41686 41685->41687 41686->41687 41687->41656 41689 7ff6570837f1 41688->41689 41693 7ff6570837fa 41688->41693 41704 7ff6570844c4 41689->41704 41690 7ff65708383d MultiByteToWideChar 41692 7ff65708385f GetLastError 41690->41692 41695 7ff6570838c5 41690->41695 41702 7ff657083800 _cwprintf_s_l 41692->41702 41693->41690 41693->41695 41693->41702 41694 7ff657083982 MultiByteToWideChar 41696 7ff6570839ae GetLastError 41694->41696 41694->41702 41695->41694 41697 7ff65708392f 41695->41697 41698 7ff65708391f 41695->41698 41695->41702 41696->41702 41709 7ff657086828 GetProcessHeap HeapAlloc 41697->41709 41708 7ff657086ba0 GetProcessHeap HeapReAlloc 41698->41708 41702->41661 41705 7ff6570844d8 41704->41705 41707 7ff6570844dd _cwprintf_s_l 41704->41707 41710 7ff657086f2c GetProcessHeap HeapSize _cwprintf_s_l 41705->41710 41707->41693 41710->41707 43389 7ff6570b1690 180 API calls _cwprintf_s_l 43441 7ff6570b9f90 88 API calls _cwprintf_s_l 43390 7ff65708a890 17 API calls _cwprintf_s_l 43394 7ff6570e3a90 67 API calls 43443 7ff6570ad380 66 API calls _cwprintf_s_l 43444 7ff6570b8180 132 API calls 43395 7ff65708ba80 83 API calls _cwprintf_s_l 43445 7ff65708b780 67 API calls 2 library calls 43446 7ff6570d3d84 GetModuleHandleW __GetCurrentState 43396 7ff6570ec880 13 API calls _cwprintf_s_l 43397 7ff6570cb480 91 API calls _cwprintf_s_l 41830 7ff6570fd67e 14 API calls 43447 7ff6570a7fb0 319 API calls _cwprintf_s_l 41726 7ff6570fdab1 41727 7ff6570fdabd 41726->41727 41730 7ff6570fe140 41727->41730 41756 7ff6570fdd94 41730->41756 41733 7ff6570fe1cb 41734 7ff6570fe0a4 DloadReleaseSectionWriteAccess 6 API calls 41733->41734 41735 7ff6570fe1d8 RaiseException 41734->41735 41736 7ff6570fdafc 41735->41736 41737 7ff6570fe1f4 41738 7ff6570fe27d LoadLibraryExA 41737->41738 41739 7ff6570fe3c5 41737->41739 41741 7ff6570fe2e9 41737->41741 41742 7ff6570fe2fd 41737->41742 41740 7ff6570fe294 GetLastError 41738->41740 41738->41741 41764 7ff6570fe0a4 41739->41764 41744 7ff6570fe2be 41740->41744 41745 7ff6570fe2a9 41740->41745 41741->41742 41746 7ff6570fe2f4 FreeLibrary 41741->41746 41742->41739 41743 7ff6570fe35b GetProcAddress 41742->41743 41743->41739 41749 7ff6570fe370 GetLastError 41743->41749 41748 7ff6570fe0a4 DloadReleaseSectionWriteAccess 6 API calls 41744->41748 41745->41741 41745->41744 41746->41742 41750 7ff6570fe2cb RaiseException 41748->41750 41752 7ff6570fe385 41749->41752 41750->41736 41751 7ff6570fe0a4 DloadReleaseSectionWriteAccess 6 API calls 41753 7ff6570fe3a7 RaiseException 41751->41753 41752->41739 41752->41751 41754 7ff6570fdd94 DloadAcquireSectionWriteAccess 6 API calls 41753->41754 41755 7ff6570fe3c1 41754->41755 41755->41739 41757 7ff6570fddaa 41756->41757 41763 7ff6570fde0f 41756->41763 41772 7ff6570fde40 41757->41772 41760 7ff6570fde0a 41762 7ff6570fde40 DloadReleaseSectionWriteAccess 3 API calls 41760->41762 41762->41763 41763->41733 41763->41737 41765 7ff6570fe0b4 41764->41765 41771 7ff6570fe10d 41764->41771 41766 7ff6570fde40 DloadReleaseSectionWriteAccess 3 API calls 41765->41766 41767 7ff6570fe0b9 41766->41767 41768 7ff6570fe108 41767->41768 41769 7ff6570fe014 DloadProtectSection 3 API calls 41767->41769 41770 7ff6570fde40 DloadReleaseSectionWriteAccess 3 API calls 41768->41770 41769->41768 41770->41771 41771->41736 41773 7ff6570fde5b 41772->41773 41774 7ff6570fddaf 41772->41774 41773->41774 41775 7ff6570fde60 GetModuleHandleW 41773->41775 41774->41760 41779 7ff6570fe014 41774->41779 41776 7ff6570fde75 41775->41776 41777 7ff6570fde7a GetProcAddress 41775->41777 41776->41774 41777->41776 41778 7ff6570fde8f GetProcAddress 41777->41778 41778->41776 41781 7ff6570fe036 DloadProtectSection 41779->41781 41780 7ff6570fe03e 41780->41760 41781->41780 41782 7ff6570fe076 VirtualProtect 41781->41782 41784 7ff6570fdee0 VirtualQuery GetSystemInfo 41781->41784 41782->41780 41784->41782 41785 7ff6570fd8b1 41787 7ff6570fd7d0 41785->41787 41786 7ff6570fe140 14 API calls 41786->41787 41787->41786 43448 7ff65708b5a0 GetNativeSystemInfo _cwprintf_s_l memcpy_s 43449 7ff65708aba0 18 API calls 2 library calls 43401 7ff6570de6a0 57 API calls Concurrency::details::SchedulerProxy::DeleteThis 43450 7ff65708a7d0 6 API calls _cwprintf_s_l 43451 7ff65708b3d0 17 API calls _cwprintf_s_l 43452 7ff6570d3dd0 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter __security_init_cookie 43453 7ff6570febcf LeaveCriticalSection Concurrency::details::SchedulerProxy::DeleteThis 43455 7ff6570df9d0 GetCommandLineA GetCommandLineW 43456 7ff6570d57c8 47 API calls 41792 7ff6570b72c0 CoInitializeEx 41793 7ff6570b72fc _cwprintf_s_l 41792->41793 41804 7ff6570b732c 41792->41804 41806 7ff6570d3b50 41793->41806 41796 7ff6570b754c SetEvent 41797 7ff6570b75bf 41796->41797 41798 7ff6570b755a GetLastError 41796->41798 41799 7ff6570818f4 2 API calls 41797->41799 41805 7ff6570b73a4 _cwprintf_s_l 41798->41805 41801 7ff6570b75cb 41799->41801 41800 7ff6570b7674 CoUninitialize 41800->41793 41802 7ff6570b75df ResetEvent 41801->41802 41801->41805 41803 7ff6570b75ed GetLastError 41802->41803 41802->41805 41803->41805 41804->41796 41804->41805 41805->41800 41807 7ff6570d3b59 41806->41807 41808 7ff6570b7689 41807->41808 41809 7ff6570d3e20 IsProcessorFeaturePresent 41807->41809 41810 7ff6570d3e38 41809->41810 41815 7ff6570d3ef4 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 41810->41815 41812 7ff6570d3e4b 41816 7ff6570d3de4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 41812->41816 41815->41812 43458 7ff6570b17c0 362 API calls _cwprintf_s_l 43459 7ff6570b89c0 CompareStringW CompareStringOrdinal GetLastError 43460 7ff6570d6fc4 61 API calls 5 library calls 41711 7ff6570b66f0 CompareStringA 41712 7ff6570b6753 GetCurrentProcess GetCurrentProcess DuplicateHandle 41711->41712 41713 7ff6570b6819 CreateFileA 41711->41713 41715 7ff6570b67ef 41712->41715 41716 7ff6570b678c GetLastError 41712->41716 41714 7ff6570b684d GetLastError 41713->41714 41719 7ff6570b67c0 _cwprintf_s_l 41713->41719 41718 7ff6570b687f _cwprintf_s_l 41714->41718 41720 7ff6570b64c4 6 API calls _cwprintf_s_l 41715->41720 41716->41719 41718->41719 41720->41719 43408 7ff65708b4f0 13 API calls _cwprintf_s_l 43410 7ff65708aaf0 77 API calls _cwprintf_s_l 41817 7ff6570b68e0 41818 7ff6570b6929 41817->41818 41819 7ff6570b69c9 ReadFile 41818->41819 41820 7ff6570b694c SetFilePointerEx 41818->41820 41821 7ff6570b69e6 GetLastError 41819->41821 41824 7ff6570b6a16 _cwprintf_s_l 41819->41824 41822 7ff6570b6960 GetLastError 41820->41822 41823 7ff6570b6992 _cwprintf_s_l 41820->41823 41821->41824 41822->41823 41823->41819 43411 7ff65708b8e0 77 API calls 3 library calls 43412 7ff65708b6e0 11 API calls _cwprintf_s_l 43413 7ff6570d44e0 56 API calls 43414 7ff6570de6e0 12 API calls 43467 7ff657087fe0 77 API calls 41721 7ff6570b6610 41722 7ff6570b663c 41721->41722 41723 7ff6570b6671 41722->41723 41724 7ff6570b666b CloseHandle 41722->41724 41724->41723 43417 7ff6570b5910 11 API calls 2 library calls 43419 7ff6570b7d10 108 API calls 43468 7ff6570b6c10 49 API calls 4 library calls 43469 7ff65708aa10 15 API calls 3 library calls 43420 7ff6570de914 54 API calls 4 library calls 43471 7ff6570ddc10 17 API calls 2 library calls 43472 7ff6570dfc10 7 API calls 43422 7ff657087d10 78 API calls _cwprintf_s_l 43474 7ff6570b8e00 96 API calls _cwprintf_s_l 43476 7ff6570d5600 10 API calls 2 library calls 43477 7ff6570e0e00 GetProcessHeap 43479 7ff6570d73fa 57 API calls 2 library calls 43425 7ff6570b1d30 5 API calls _cwprintf_s_l 43480 7ff6570b5430 19 API calls 43426 7ff6570fd734 14 API calls 43427 7ff65708232c 60 API calls _cwprintf_s_l 43482 7ff65708a830 6 API calls _cwprintf_s_l 43483 7ff65708ae30 5 API calls _cwprintf_s_l 43428 7ff6570db930 11 API calls 43429 7ff6570ddd30 80 API calls __free_lconv_mon 43486 7ff6570e6230 CloseHandle 43488 7ff6570db22c 50 API calls __free_lconv_mon 43491 7ff6570fbe20 CompareStringOrdinal GetLastError 43430 7ff6570e0d20 FreeLibrary 43372 7ff6570fd71b 43373 7ff6570fd690 43372->43373 43374 7ff6570fe140 14 API calls 43373->43374 43375 7ff6570fd6cf 43374->43375 43492 7ff6570fe618 57 API calls _CallSETranslator

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 55 7ff657090238-7ff6570902c8 call 7ff6570d47d0 * 3 62 7ff657090312-7ff657090332 SetFilePointerEx 55->62 63 7ff6570902ca-7ff6570902fd GetLastError call 7ff6570812b0 55->63 65 7ff657090371-7ff65709038d ReadFile 62->65 66 7ff657090334-7ff65709036f GetLastError call 7ff6570812b0 62->66 75 7ff657090304-7ff65709030d 63->75 67 7ff6570903cf-7ff6570903d4 65->67 68 7ff65709038f-7ff6570903ca GetLastError call 7ff6570812b0 65->68 66->75 73 7ff657090b26-7ff657090b43 call 7ff6570812b0 67->73 74 7ff6570903da-7ff6570903e3 67->74 68->75 84 7ff657090b4a-7ff657090b4f 73->84 74->73 78 7ff6570903e9-7ff6570903fe SetFilePointerEx 74->78 79 7ff657090b53-7ff657090b68 call 7ff6570812b4 75->79 82 7ff657090440-7ff65709045f ReadFile 78->82 83 7ff657090400-7ff657090434 GetLastError call 7ff6570812b0 78->83 85 7ff657090b6d-7ff657090b9e call 7ff6570d3b50 79->85 87 7ff6570904a1-7ff6570904a6 82->87 88 7ff657090461-7ff657090495 GetLastError call 7ff6570812b0 82->88 83->82 84->79 89 7ff657090b00-7ff657090b24 call 7ff6570812b0 87->89 90 7ff6570904ac-7ff6570904b3 87->90 88->87 89->84 90->89 94 7ff6570904b9-7ff6570904db SetFilePointerEx 90->94 99 7ff65709051d-7ff65709053f ReadFile 94->99 100 7ff6570904dd-7ff657090511 GetLastError call 7ff6570812b0 94->100 102 7ff657090581-7ff65709059e ReadFile 99->102 103 7ff657090541-7ff657090575 GetLastError call 7ff6570812b0 99->103 100->99 106 7ff6570905e0-7ff657090600 SetFilePointerEx 102->106 107 7ff6570905a0-7ff6570905d4 GetLastError call 7ff6570812b0 102->107 103->102 108 7ff657090642-7ff657090665 ReadFile 106->108 109 7ff657090602-7ff657090636 GetLastError call 7ff6570812b0 106->109 107->106 114 7ff657090667 108->114 115 7ff6570906bc-7ff65709071d GetLastError call 7ff6570812b0 call 7ff6570812b4 108->115 109->108 117 7ff65709066c-7ff657090671 114->117 115->85 119 7ff657090ab2-7ff657090ad4 call 7ff6570812b0 117->119 120 7ff657090677-7ff657090683 117->120 135 7ff657090ad9-7ff657090afe call 7ff6570812b4 119->135 124 7ff657090749-7ff65709074e 120->124 125 7ff657090689-7ff65709068f 120->125 127 7ff65709077f-7ff657090793 call 7ff657086828 124->127 128 7ff657090750-7ff65709077a call 7ff6570812b0 124->128 130 7ff657090722-7ff657090744 call 7ff6570812b0 125->130 131 7ff657090695-7ff6570906ba ReadFile 125->131 141 7ff6570907be-7ff6570907d3 SetFilePointerEx 127->141 142 7ff657090795-7ff6570907b9 call 7ff6570812b0 127->142 128->135 140 7ff6570908a9-7ff6570908c7 call 7ff6570812b4 130->140 131->115 131->117 135->85 151 7ff6570908cc-7ff6570908ce 140->151 144 7ff657090815-7ff65709083b ReadFile 141->144 145 7ff6570907d5-7ff657090810 GetLastError call 7ff6570812b0 141->145 142->84 149 7ff65709087d-7ff657090885 144->149 150 7ff65709083d-7ff657090878 GetLastError call 7ff6570812b0 144->150 158 7ff657090a79 145->158 155 7ff6570908d3-7ff6570908d8 149->155 156 7ff657090887-7ff6570908a2 call 7ff6570812b0 149->156 150->158 157 7ff657090a9c-7ff657090a9f 151->157 162 7ff657090929-7ff657090935 155->162 163 7ff6570908da-7ff6570908fd call 7ff6570812b0 155->163 156->140 157->85 159 7ff657090aa5-7ff657090aad call 7ff657086a48 157->159 165 7ff657090a7b-7ff657090a80 158->165 159->85 167 7ff657090963-7ff657090975 call 7ff6570f3090 162->167 168 7ff657090937-7ff657090961 call 7ff6570812b0 162->168 175 7ff657090904-7ff657090927 call 7ff6570812b4 163->175 171 7ff657090a84-7ff657090a97 call 7ff6570812b4 165->171 180 7ff657090977-7ff657090983 167->180 181 7ff657090988-7ff657090995 167->181 168->175 171->157 175->151 180->165 183 7ff657090997-7ff65709099b 181->183 184 7ff65709099d-7ff6570909a3 181->184 187 7ff6570909b1-7ff657090a03 call 7ff657086828 183->187 185 7ff6570909a5-7ff6570909a9 184->185 186 7ff6570909ab-7ff6570909af 184->186 185->187 186->187 190 7ff657090a05-7ff657090a37 call 7ff6570812b0 187->190 191 7ff657090a39-7ff657090a5a call 7ff6570d4b90 call 7ff65708fecc 187->191 190->171 191->157 198 7ff657090a5c-7ff657090a72 call 7ff6570812b0 191->198 198->158
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$File$Pointer$Read
                                                                      • String ID: ($4$Failed to allocate buffer for section info.$Failed to allocate memory for container sizes.$Failed to find Burn section.$Failed to find valid DOS image header in buffer.$Failed to find valid NT image header in buffer.$Failed to get total size of bundle.$Failed to open handle to engine process path.$Failed to read DOS header.$Failed to read NT header.$Failed to read complete image section header, index: %u$Failed to read complete section info.$Failed to read image section header, index: %u$Failed to read section info, data too short: %u$Failed to read section info, unsupported version: %08x$Failed to read section info.$Failed to read signature offset.$Failed to read signature size.$Failed to seek past optional headers.$Failed to seek to NT header.$Failed to seek to section info.$Failed to seek to start of file.$Invalid section info, cContainers too large: %u$PE Header from file didn't match PE Header in memory.$d:\a\wix4\wix4\src\burn\engine\section.cpp
                                                                      • API String ID: 2600052162-807141041
                                                                      • Opcode ID: d88e13f582e143ad85da803e65f928623628dee30627a78611f5db80cc6f2063
                                                                      • Instruction ID: fd888f3ea58681d9ebe90e6b2a6a3c3972fb08e221cccd77cf5ccad6c474011d
                                                                      • Opcode Fuzzy Hash: d88e13f582e143ad85da803e65f928623628dee30627a78611f5db80cc6f2063
                                                                      • Instruction Fuzzy Hash: B442AFB2B18606CBEB20CB19E48077A23E5BB89790F59413ADA4DE3794DF3DE509C744

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 201 7ff6570872ac-7ff657087335 call 7ff6570d47d0 * 2 GetFileAttributesW 206 7ff65708733b-7ff657087351 GetLastError 201->206 207 7ff6570873be-7ff6570873c0 201->207 208 7ff65708735a-7ff657087368 206->208 209 7ff657087353-7ff657087358 206->209 210 7ff6570873c6-7ff6570873c8 207->210 211 7ff65708792e-7ff65708795b call 7ff6570812b0 207->211 212 7ff65708736a-7ff657087385 call 7ff6570812b0 208->212 213 7ff6570873b4-7ff6570873b9 208->213 209->212 215 7ff6570873ca-7ff6570873da SetFileAttributesW 210->215 216 7ff657087432-7ff65708744c 210->216 229 7ff65708795f-7ff657087964 211->229 238 7ff65708738c-7ff6570873af call 7ff6570812b4 212->238 221 7ff65708798c-7ff657087994 213->221 215->216 222 7ff6570873dc-7ff6570873f2 GetLastError 215->222 218 7ff657087458-7ff65708745c 216->218 219 7ff65708744e-7ff657087452 216->219 227 7ff65708749c-7ff6570874b4 call 7ff657084be0 218->227 228 7ff65708745e-7ff65708746e call 7ff65708608c 218->228 219->218 226 7ff657087754-7ff657087761 RemoveDirectoryW 219->226 230 7ff65708799b-7ff6570879a3 221->230 231 7ff657087996 call 7ff657084278 221->231 223 7ff6570873fb-7ff657087409 222->223 224 7ff6570873f4-7ff6570873f9 222->224 223->213 233 7ff65708740b-7ff65708742d call 7ff6570812b0 223->233 224->233 236 7ff657087978-7ff657087981 226->236 237 7ff657087767-7ff657087781 GetLastError 226->237 253 7ff6570874b6-7ff6570874cc 227->253 254 7ff6570874d4-7ff6570874ed FindFirstFileW 227->254 228->227 263 7ff657087470-7ff657087497 call 7ff6570812b4 228->263 240 7ff657087967-7ff657087973 call 7ff6570812b4 229->240 234 7ff6570879aa-7ff6570879b2 230->234 235 7ff6570879a5 call 7ff657084278 230->235 231->230 233->238 247 7ff6570879b9-7ff6570879e4 call 7ff6570d3b50 234->247 248 7ff6570879b4 call 7ff657084278 234->248 235->234 236->221 252 7ff657087983-7ff657087986 FindClose 236->252 245 7ff657087783-7ff657087787 237->245 246 7ff6570877a0-7ff6570877a9 237->246 238->221 240->236 256 7ff657087789-7ff65708779b MoveFileExW 245->256 257 7ff6570877d0-7ff6570877e4 call 7ff6570812b0 245->257 259 7ff65708788c-7ff657087891 246->259 260 7ff6570877af-7ff6570877b5 246->260 248->247 252->221 253->254 264 7ff657087539 254->264 265 7ff6570874ef-7ff657087531 GetLastError call 7ff6570812b0 254->265 256->257 266 7ff65708779d 256->266 280 7ff6570877eb-7ff6570877f1 257->280 259->236 267 7ff6570877c8-7ff6570877ca 260->267 268 7ff6570877b7-7ff6570877bc 260->268 263->221 273 7ff65708753b-7ff657087544 264->273 265->264 266->246 267->236 267->257 268->257 274 7ff6570877be-7ff6570877c2 268->274 278 7ff657087546-7ff65708754d 273->278 279 7ff657087562-7ff657087592 call 7ff657082bb4 273->279 274->236 274->267 281 7ff657087729-7ff65708773d FindNextFileW 278->281 282 7ff657087553-7ff657087556 278->282 287 7ff657087909-7ff657087910 279->287 288 7ff657087598-7ff6570875b0 call 7ff657084be0 279->288 280->229 281->273 284 7ff657087743-7ff65708774c GetLastError 281->284 282->279 285 7ff657087558-7ff65708755c 282->285 289 7ff657087896-7ff6570878ce GetLastError call 7ff6570812b0 284->289 290 7ff657087752 284->290 285->279 285->281 292 7ff657087915-7ff65708792c call 7ff6570812b4 287->292 297 7ff6570875b6-7ff6570875ba 288->297 298 7ff6570878d3-7ff657087907 call 7ff6570812b4 288->298 289->280 290->226 292->236 301 7ff6570875bc-7ff6570875c1 297->301 302 7ff657087631-7ff657087637 297->302 298->236 301->302 305 7ff6570875c3-7ff6570875d1 call 7ff657084ab4 301->305 302->281 303 7ff65708763d-7ff657087642 302->303 306 7ff65708768c-7ff657087699 DeleteFileW 303->306 307 7ff657087644-7ff657087656 SetFileAttributesW 303->307 316 7ff6570875d7-7ff6570875df call 7ff6570872ac 305->316 317 7ff6570877f6-7ff657087812 305->317 306->281 310 7ff65708769f-7ff6570876a3 306->310 307->306 309 7ff657087658-7ff65708766d GetLastError 307->309 312 7ff657087817 309->312 313 7ff657087673-7ff657087681 309->313 314 7ff6570876fa-7ff65708770f GetLastError 310->314 315 7ff6570876a5-7ff6570876c2 call 7ff657085d3c 310->315 318 7ff65708781c-7ff65708783a call 7ff6570812b0 312->318 313->318 319 7ff657087687 313->319 322 7ff657087715-7ff657087723 314->322 323 7ff657087860 314->323 330 7ff6570876c8-7ff6570876eb MoveFileExW 315->330 331 7ff65708784f-7ff65708785b 315->331 327 7ff6570875e4-7ff6570875ee 316->327 317->240 333 7ff657087841-7ff65708784a 318->333 319->281 322->281 325 7ff657087865-7ff65708788a call 7ff6570812b0 322->325 323->325 325->333 327->281 332 7ff6570875f4-7ff6570875f9 327->332 335 7ff6570876ed 330->335 336 7ff6570876f2-7ff6570876f8 MoveFileExW 330->336 331->292 332->281 337 7ff6570875ff-7ff65708762c call 7ff6570812b4 332->337 333->240 335->336 336->281 337->281
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFileLast$Attributes$FindFirst
                                                                      • String ID: *.*$DEL$Directory delete cannot delete file: %ls$Failed to concat filename '%ls' to directory: %ls$Failed to concat wild cards to string: %ls$Failed to delete file: %ls$Failed to delete subdirectory; continuing: %ls$Failed to ensure file name was null terminated.$Failed to ensure path is backslash terminated: %ls$Failed to get attributes for path: %ls$Failed to get temp directory.$Failed to get temp file to move to.$Failed to remove attributes from file: %ls$Failed to remove directory: %ls$Failed to remove read-only attribute from path: %ls$Failed while looping through files in directory: %ls$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\dirutil.cpp$failed to get first file in directory: %ls
                                                                      • API String ID: 3680393312-305978383
                                                                      • Opcode ID: 60e1ccfe82e415a2a7bb83c5e28c6d2ff0e706d8bfe369be2fbd74d2c94484a1
                                                                      • Instruction ID: ad3a4bac30dbffb688d787f44beceac030a5345c096796945681f39e12a8f2eb
                                                                      • Opcode Fuzzy Hash: 60e1ccfe82e415a2a7bb83c5e28c6d2ff0e706d8bfe369be2fbd74d2c94484a1
                                                                      • Instruction Fuzzy Hash: D112D5A1B1C74B86EB209BA5E48067A62E0BF84B94F481135DE4EF7798DF7DE508C704

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 340 7ff657089464-7ff657089549 call 7ff6570d47d0 * 3 GetModuleHandleW call 7ff6570e847c call 7ff657081234 call 7ff6570e87d0 call 7ff6570e67b0 355 7ff65708954b-7ff657089552 340->355 356 7ff65708957d-7ff65708958d call 7ff657088018 340->356 358 7ff657089557-7ff657089578 call 7ff6570812b4 355->358 362 7ff65708958f-7ff65708959b 356->362 363 7ff65708959d-7ff6570895a8 356->363 364 7ff657089903-7ff65708990e 358->364 362->358 365 7ff6570895be-7ff6570895d1 call 7ff657089b5c CoInitializeEx 363->365 366 7ff6570895aa-7ff6570895ae 363->366 367 7ff657089910 call 7ff657084278 364->367 368 7ff657089915-7ff657089917 364->368 378 7ff6570895d3-7ff6570895df 365->378 379 7ff6570895e4-7ff6570895f2 call 7ff6570e76e8 365->379 366->365 369 7ff6570895b0-7ff6570895b9 call 7ff6570b5628 366->369 367->368 372 7ff657089927-7ff657089950 call 7ff657099270 call 7ff6570a56ac call 7ff6570a59ac 368->372 373 7ff657089919-7ff657089920 368->373 369->365 392 7ff657089952-7ff657089957 372->392 393 7ff657089989-7ff65708998e 372->393 373->372 376 7ff657089922 call 7ff65709f0c8 373->376 376->372 378->358 385 7ff6570895f4-7ff657089600 379->385 386 7ff657089605-7ff657089617 call 7ff6570efa80 call 7ff6570ea270 379->386 385->358 402 7ff657089619-7ff657089625 386->402 403 7ff65708962a-7ff657089637 call 7ff6570edab4 386->403 392->393 395 7ff657089959-7ff65708995c 392->395 397 7ff657089990-7ff657089994 393->397 398 7ff6570899b5-7ff6570899ba 393->398 395->393 401 7ff65708995e-7ff657089983 call 7ff65709f584 call 7ff657089b38 395->401 404 7ff657089996 397->404 405 7ff657089999-7ff6570899b3 call 7ff65709e7f8 call 7ff657089b38 397->405 399 7ff6570899bc-7ff6570899c1 398->399 400 7ff6570899cd-7ff6570899d2 398->400 406 7ff6570899c3 399->406 407 7ff6570899c6-7ff6570899cb 399->407 409 7ff6570899d4-7ff6570899d9 400->409 410 7ff6570899ed-7ff6570899f8 call 7ff6570e8178 400->410 401->393 402->358 422 7ff657089639-7ff657089645 403->422 423 7ff65708964a-7ff657089657 call 7ff6570eee04 403->423 404->405 405->410 406->407 413 7ff6570899e3-7ff6570899e8 call 7ff657089b38 407->413 415 7ff6570899de 409->415 416 7ff6570899db 409->416 428 7ff657089a19-7ff657089a1d 410->428 429 7ff6570899fa-7ff657089a02 410->429 413->410 415->413 416->415 422->358 437 7ff657089659-7ff657089660 423->437 438 7ff65708966a-7ff65708967e call 7ff6570e8c84 423->438 431 7ff657089a1f-7ff657089a39 call 7ff657089b38 call 7ff6570882a8 428->431 432 7ff657089a57-7ff657089a62 call 7ff6570b5dc0 428->432 429->428 434 7ff657089a04-7ff657089a17 call 7ff6570a0c78 429->434 431->432 456 7ff657089a3b-7ff657089a52 call 7ff6570e7f80 431->456 446 7ff657089a72-7ff657089a8e call 7ff6570a9c68 call 7ff6570e878c 432->446 447 7ff657089a64-7ff657089a70 call 7ff6570ad1c4 432->447 434->432 437->438 449 7ff657089680-7ff657089687 438->449 450 7ff657089691-7ff6570896b6 GetNativeSystemInfo 438->450 469 7ff657089a90-7ff657089a9f call 7ff6570e887c 446->469 470 7ff657089aa6-7ff657089aab 446->470 463 7ff657089abf-7ff657089acd call 7ff657089124 447->463 449->450 454 7ff6570896b8-7ff6570896ba 450->454 455 7ff6570896dd 450->455 459 7ff6570896d4-7ff6570896db 454->459 460 7ff6570896bc-7ff6570896bf 454->460 462 7ff6570896e4-7ff65708974f call 7ff65708543c call 7ff657089b38 455->462 456->432 459->462 465 7ff6570896cf-7ff6570896d2 460->465 466 7ff6570896c1-7ff6570896c4 460->466 486 7ff657089751-7ff657089756 call 7ff657084278 462->486 487 7ff65708975c-7ff657089769 call 7ff6570aaafc 462->487 475 7ff657089acf call 7ff6570ef7d0 463->475 476 7ff657089ad4-7ff657089ad9 463->476 465->462 466->462 471 7ff6570896c6-7ff6570896cd 466->471 469->470 491 7ff657089aa1 call 7ff657084278 469->491 478 7ff657089ab0-7ff657089aba call 7ff657089b38 470->478 479 7ff657089aad 470->479 471->462 475->476 482 7ff657089ae0-7ff657089ae5 476->482 483 7ff657089adb call 7ff6570ee250 476->483 478->463 479->478 489 7ff657089ae7 call 7ff6570eb31c 482->489 490 7ff657089aec-7ff657089af1 482->490 483->482 486->487 504 7ff65708977f-7ff657089787 487->504 505 7ff65708976b-7ff657089775 487->505 489->490 496 7ff657089af3-7ff657089af8 call 7ff6570efb74 call 7ff6570e7890 490->496 497 7ff657089afd-7ff657089aff 490->497 491->470 496->497 501 7ff657089b01 CoUninitialize 497->501 502 7ff657089b07-7ff657089b0e call 7ff657081274 call 7ff6570e8a34 497->502 501->502 515 7ff657089b13-7ff657089b37 call 7ff6570d3b50 502->515 508 7ff6570898d3-7ff6570898db call 7ff657088e70 504->508 509 7ff65708978d-7ff65708978f 504->509 505->504 519 7ff6570898e0-7ff6570898e4 508->519 512 7ff657089795-7ff657089797 509->512 513 7ff6570898a9-7ff6570898bd call 7ff6570889d0 509->513 517 7ff65708987c-7ff657089893 call 7ff6570886c8 512->517 518 7ff65708979d-7ff65708979f 512->518 521 7ff6570898fa-7ff657089900 513->521 530 7ff6570898bf-7ff6570898c9 513->530 517->521 534 7ff657089895-7ff65708989f 517->534 525 7ff6570897a1-7ff6570897a3 518->525 526 7ff6570897ec-7ff657089802 call 7ff65709fed4 518->526 520 7ff6570898e6-7ff6570898f0 519->520 519->521 520->521 521->364 531 7ff6570897be-7ff6570897d2 call 7ff657088d08 525->531 532 7ff6570897a5-7ff6570897b4 525->532 537 7ff657089812-7ff657089834 call 7ff6570889d0 526->537 538 7ff657089804-7ff657089810 526->538 530->508 531->521 539 7ff6570897d8-7ff6570897e2 531->539 532->531 534->513 544 7ff657089860-7ff657089862 537->544 545 7ff657089836-7ff65708983d 537->545 540 7ff657089842-7ff65708985b call 7ff6570812b4 538->540 539->526 540->544 544->521 546 7ff657089868-7ff657089872 544->546 545->540 546->517
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Initialize$CriticalFreeHandleInfoLibraryModuleNativeSectionSystemUninitialize_cwprintf_s_l
                                                                      • String ID: 4.0.0+8c757c0f67f26f21c6bcbbfb81b7ea8b91c35fe4$ARM$ARM64$Failed to connect to parent of embedded process.$Failed to get OS info.$Failed to initialize COM.$Failed to initialize Cryputil.$Failed to initialize Regutil.$Failed to initialize Wiutil.$Failed to initialize XML util.$Failed to initialize core.$Failed to initialize engine state.$Failed to parse command line.$Failed to run RunOnce mode.$Failed to run bootstrapper application embedded.$Failed to run embedded mode.$Failed to run per-machine mode.$Failed to run per-user mode.$Failed to run untrusted mode.$Invalid run mode.$d:\a\wix4\wix4\src\burn\engine\engine.cpp$unknown architecture$x64$x86
                                                                      • API String ID: 2158560762-3243415026
                                                                      • Opcode ID: e36adcbc4c369f94fbaff1b94ace581215e5879ba3a01d0b6526716f1c2ffd86
                                                                      • Instruction ID: 6432d5865c9794a534a21d80176f774dbffa755498607db832d35799b3227ffb
                                                                      • Opcode Fuzzy Hash: e36adcbc4c369f94fbaff1b94ace581215e5879ba3a01d0b6526716f1c2ffd86
                                                                      • Instruction Fuzzy Hash: AC128FA1B2864B8AFF20EF65D8442BD62E5AF84744F5C0136DA4DE6A99DF3CE50DC700

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 900 7ff65709eb98-7ff65709ebd5 901 7ff65709ebf3 900->901 902 7ff65709ebd7-7ff65709ebda 900->902 905 7ff65709ebfa-7ff65709ec24 call 7ff6570ea65c 901->905 903 7ff65709ebea-7ff65709ebf1 902->903 904 7ff65709ebdc-7ff65709ebdf 902->904 903->905 904->905 907 7ff65709ebe1-7ff65709ebe8 904->907 909 7ff65709ec7e 905->909 910 7ff65709ec26-7ff65709ec3c call 7ff6570ea904 905->910 907->905 912 7ff65709ec82-7ff65709ec85 909->912 910->909 919 7ff65709ec3e-7ff65709ec4b 910->919 914 7ff65709ec8f-7ff65709ec96 912->914 915 7ff65709ec87-7ff65709ec8a call 7ff657084278 912->915 917 7ff65709eca2-7ff65709ecb2 914->917 918 7ff65709ec98-7ff65709ec9e RegCloseKey 914->918 915->914 920 7ff65709ecb4-7ff65709ecb8 917->920 921 7ff65709ecf9-7ff65709ecfb 917->921 918->917 919->912 922 7ff65709ec4d 919->922 920->921 923 7ff65709ecba-7ff65709ecca call 7ff6570837ac 920->923 925 7ff65709ed2f-7ff65709ed33 921->925 926 7ff65709ecfd-7ff65709ed04 921->926 924 7ff65709ec53-7ff65709ec5a 922->924 923->921 947 7ff65709eccc-7ff65709ecf4 call 7ff6570812b4 923->947 930 7ff65709ec6c 924->930 931 7ff65709ec5c-7ff65709ec64 924->931 927 7ff65709edd7-7ff65709ede3 925->927 928 7ff65709ed39-7ff65709ed3d 925->928 932 7ff65709ed09-7ff65709ed2a call 7ff6570812b4 926->932 935 7ff65709ef19-7ff65709ef24 927->935 936 7ff65709ede9-7ff65709edec 927->936 933 7ff65709ed3f-7ff65709ed44 928->933 934 7ff65709ed46-7ff65709ed4a 928->934 938 7ff65709ec70-7ff65709ec7a 930->938 931->938 939 7ff65709ec66-7ff65709ec6a 931->939 958 7ff65709f096-7ff65709f09d 932->958 941 7ff65709ed51-7ff65709ed53 call 7ff6570e87d0 933->941 942 7ff65709ed58-7ff65709ed5f 934->942 943 7ff65709ed4c 934->943 945 7ff65709ef3e-7ff65709ef45 935->945 946 7ff65709ef26-7ff65709ef29 935->946 936->935 944 7ff65709edf2-7ff65709edf5 936->944 938->924 948 7ff65709ec7c 938->948 939->938 941->942 951 7ff65709ed61-7ff65709ed65 942->951 952 7ff65709ed67-7ff65709ed71 942->952 943->941 953 7ff65709edf8-7ff65709edfa 944->953 956 7ff65709f017-7ff65709f01f call 7ff6570e7f04 945->956 957 7ff65709ef4b-7ff65709ef4e 945->957 946->945 954 7ff65709ef2b-7ff65709ef35 call 7ff65708c5ac 946->954 947->921 948->912 951->927 951->952 962 7ff65709ed73-7ff65709ed77 952->962 963 7ff65709ed79-7ff65709ed8c call 7ff6570837ac 952->963 959 7ff65709ee07-7ff65709ee31 call 7ff6570e84ac 953->959 960 7ff65709edfc-7ff65709ee01 Sleep 953->960 971 7ff65709ef3a-7ff65709ef3c 954->971 981 7ff65709f027-7ff65709f03b call 7ff6570837ac 956->981 957->956 967 7ff65709ef54-7ff65709ef69 call 7ff657086654 957->967 965 7ff65709f09f call 7ff657084278 958->965 966 7ff65709f0a4-7ff65709f0c6 call 7ff657084578 958->966 982 7ff65709ee33-7ff65709ee38 959->982 983 7ff65709ee3c-7ff65709ee3e 959->983 960->959 962->927 962->963 984 7ff65709ed9f-7ff65709eda9 963->984 985 7ff65709ed8e-7ff65709ed9a 963->985 965->966 979 7ff65709efe7-7ff65709eff6 call 7ff65709e610 967->979 980 7ff65709ef6b-7ff65709ef6e 967->980 971->945 1000 7ff65709efb4-7ff65709efcf call 7ff6570e84ac 979->1000 1001 7ff65709eff8-7ff65709efff 979->1001 980->979 987 7ff65709ef70-7ff65709ef81 call 7ff657085634 980->987 1006 7ff65709f074-7ff65709f07b 981->1006 1007 7ff65709f03d-7ff65709f044 981->1007 982->983 989 7ff65709ee3a 982->989 990 7ff65709ee40-7ff65709ee43 983->990 991 7ff65709ee45-7ff65709ee47 983->991 992 7ff65709edb1-7ff65709edc4 call 7ff6570837ac 984->992 993 7ff65709edab-7ff65709edaf 984->993 985->932 1010 7ff65709ef83-7ff65709efa1 987->1010 1011 7ff65709efa6-7ff65709efb2 call 7ff657085288 987->1011 989->983 990->953 990->991 995 7ff65709ef0e-7ff65709ef14 991->995 996 7ff65709ee4d-7ff65709ee59 call 7ff6570e7f04 991->996 992->927 1009 7ff65709edc6-7ff65709edd2 992->1009 993->927 993->992 1005 7ff65709ee5e-7ff65709ee65 995->1005 1017 7ff65709eeb9-7ff65709eed2 call 7ff6570b586c 996->1017 1018 7ff65709ee5b 996->1018 1023 7ff65709efd4-7ff65709efdb 1000->1023 1016 7ff65709f009 1001->1016 1005->958 1012 7ff65709ee6b-7ff65709ee79 call 7ff657085238 1005->1012 1006->958 1013 7ff65709f07d-7ff65709f081 1006->1013 1015 7ff65709f04e-7ff65709f061 call 7ff6570837ac 1007->1015 1009->932 1019 7ff65709eef1-7ff65709ef09 call 7ff6570812b4 1010->1019 1011->1000 1012->1015 1035 7ff65709ee7f-7ff65709ee83 1012->1035 1013->958 1022 7ff65709f083-7ff65709f091 call 7ff65708db80 1013->1022 1015->1006 1038 7ff65709f063-7ff65709f06a 1015->1038 1027 7ff65709f00f 1016->1027 1017->1005 1037 7ff65709eed4-7ff65709eeed 1017->1037 1018->1005 1019->958 1022->958 1023->1016 1031 7ff65709efdd-7ff65709efe5 call 7ff6570e7f04 1023->1031 1027->956 1031->1027 1035->1015 1039 7ff65709ee89-7ff65709eea2 call 7ff6570837ac 1035->1039 1037->1019 1038->1006 1039->981 1043 7ff65709eea8-7ff65709eeaf 1039->1043 1043->1017
                                                                      APIs
                                                                      • RegCloseKey.ADVAPI32(?,?,?,00000000,?,?,?,00000001,?,00007FF657088ED8), ref: 00007FF65709EC98
                                                                      • Sleep.KERNEL32(?,?,?,00000000,?,?,?,00000001,?,00007FF657088ED8), ref: 00007FF65709EE01
                                                                        • Part of subcall function 00007FF6570E7F04: EnterCriticalSection.KERNEL32(?,?,?,?,00007FF65709F01C,?,?,?,00000000,?,?,?,00000001,?,00007FF657088ED8), ref: 00007FF6570E7F0F
                                                                        • Part of subcall function 00007FF6570E7F04: CloseHandle.KERNEL32(?,?,?,?,00007FF65709F01C,?,?,?,00000000,?,?,?,00000001,?,00007FF657088ED8), ref: 00007FF6570E7F2C
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Close$CriticalEnterHandleSectionSleep
                                                                      • String ID: .cleanroom$.elevated$.runonce$Failed to copy default log extension.$Failed to copy default log prefix.$Failed to copy full log path to prefix.$Failed to copy log extension to extension.$Failed to copy log file path from command line.$Failed to copy log path to prefix.$Failed to get non-session specific TEMP folder.$Failed to get parent directory from '%ls'.$Failed to initialize logging.$Failed to open log: %ls$Logging$SOFTWARE\Policies\Microsoft\Windows\Installer$Setup$d:\a\wix4\wix4\src\burn\engine\logging.cpp$log
                                                                      • API String ID: 443246293-1383633517
                                                                      • Opcode ID: 21f2da48729c3b114a5a2884a93ce354bf2ccf7fbf0d73ec89bf734ed05ce1e0
                                                                      • Instruction ID: 23b240803d202814c5389b846f9bf2eec9be807ffb5205194b670eea1e646d2f
                                                                      • Opcode Fuzzy Hash: 21f2da48729c3b114a5a2884a93ce354bf2ccf7fbf0d73ec89bf734ed05ce1e0
                                                                      • Instruction Fuzzy Hash: 8AE1CDA2B0975A86FB649B21D4902B922E4FF64784F4C4036DE4DE7B95EF3DE958C300
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalSection$EnterLeave
                                                                      • String ID: *****$.cleanroom$Failed to allocate buffer for format string.$Failed to allocate record.$Failed to allocate string.$Failed to allocate variable array.$Failed to append placeholder.$Failed to append string.$Failed to copy string.$Failed to determine variable visibility: '%ls'.$Failed to format placeholder string.$Failed to format record.$Failed to get formatted length.$Failed to get variable name.$Failed to length of format string.$Failed to reallocate variable array.$Failed to set record format string.$Failed to set record string.$Failed to set variable value.$[%d]$d:\a\wix4\wix4\src\burn\engine\variable.cpp
                                                                      • API String ID: 3168844106-2640746530
                                                                      • Opcode ID: 0e8b062e9232d20b26b77f35d1d9708b7e9e7c89f1d33bfce972226b9cf0c200
                                                                      • Instruction ID: b484e6bb3e36abe32ce73ba7f200d9ca2055d8c533319606bd5a1ad9454aedc4
                                                                      • Opcode Fuzzy Hash: 0e8b062e9232d20b26b77f35d1d9708b7e9e7c89f1d33bfce972226b9cf0c200
                                                                      • Instruction Fuzzy Hash: 6C32AFE2F1866A86FB20DB6194902BA26D1AF84794F5C0139DE0EF7B95DF3CE5098704

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1272 7ff6570a1be0-7ff6570a1c49 CreateFileW 1273 7ff6570a1cb0-7ff6570a1cc4 call 7ff6570f2e84 1272->1273 1274 7ff6570a1c4b-7ff6570a1cab GetLastError call 7ff6570812b0 call 7ff6570812b4 1272->1274 1280 7ff6570a1cc6-7ff6570a1cf5 call 7ff6570812b4 1273->1280 1281 7ff6570a1cfa-7ff6570a1d07 call 7ff6570f1d8c 1273->1281 1286 7ff6570a1f1b-7ff6570a1f38 call 7ff6570d3b50 1274->1286 1288 7ff6570a1f12-7ff6570a1f15 CloseHandle 1280->1288 1285 7ff6570a1d0c-7ff6570a1d10 1281->1285 1289 7ff6570a1d12-7ff6570a1d46 call 7ff6570812b4 1285->1289 1290 7ff6570a1d4b-7ff6570a1d4f 1285->1290 1288->1286 1289->1288 1290->1288 1293 7ff6570a1d55-7ff6570a1d69 SetFilePointerEx 1290->1293 1296 7ff6570a1d6b-7ff6570a1d9f GetLastError call 7ff6570812b0 1293->1296 1297 7ff6570a1dad-7ff6570a1dc6 call 7ff6570f35ec 1293->1297 1302 7ff6570a1da6-7ff6570a1da8 1296->1302 1303 7ff6570a1dd9-7ff6570a1ded SetFilePointerEx 1297->1303 1304 7ff6570a1dc8-7ff6570a1dd4 1297->1304 1305 7ff6570a1ef4-7ff6570a1f0d call 7ff6570812b4 1302->1305 1306 7ff6570a1e2f-7ff6570a1e42 call 7ff6570f35ec 1303->1306 1307 7ff6570a1def-7ff6570a1e2a GetLastError call 7ff6570812b0 1303->1307 1304->1305 1305->1288 1313 7ff6570a1e55-7ff6570a1e68 call 7ff6570f35ec 1306->1313 1314 7ff6570a1e44-7ff6570a1e50 1306->1314 1307->1302 1317 7ff6570a1e78-7ff6570a1e8d SetFilePointerEx 1313->1317 1318 7ff6570a1e6a-7ff6570a1e76 1313->1318 1314->1305 1319 7ff6570a1ecf-7ff6570a1ee6 call 7ff6570f35ec 1317->1319 1320 7ff6570a1e8f-7ff6570a1ec3 GetLastError call 7ff6570812b0 1317->1320 1318->1305 1319->1288 1325 7ff6570a1ee8-7ff6570a1eef 1319->1325 1320->1319 1325->1305
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CloseCreateErrorFileHandleLast
                                                                      • String ID: .cr$Failed to copy engine from: %ls to: %ls$Failed to create engine file at path: %ls$Failed to seek to beginning of engine file: %ls$Failed to seek to checksum in exe header.$Failed to seek to original data in exe burn section header.$Failed to seek to signature table in exe header.$Failed to update signature offset.$Failed to zero out original data offset.$d:\a\wix4\wix4\src\burn\engine\cache.cpp
                                                                      • API String ID: 2528220319-4111140883
                                                                      • Opcode ID: 63027c80af3d4ebf1d36603d37c782b36fa3121484d4d79a259a6ad377d275da
                                                                      • Instruction ID: 42994ae20cf6c633fc5cadcaf55ceb1f3c54f06354fd1af6c56fb61a10426883
                                                                      • Opcode Fuzzy Hash: 63027c80af3d4ebf1d36603d37c782b36fa3121484d4d79a259a6ad377d275da
                                                                      • Instruction Fuzzy Hash: D791C361B2875686F720DB25E48077622E4BF58B90F884135DD8DE7B94DF3CE5098744

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1386 7ff6570ee4b8-7ff6570ee503 GetModuleHandleA 1387 7ff6570ee5af-7ff6570ee5c2 GetProcAddress 1386->1387 1388 7ff6570ee509-7ff6570ee55e GetLastError call 7ff6570812b0 call 7ff6570812b4 1386->1388 1389 7ff6570ee5c4-7ff6570ee600 GetProcAddress * 3 1387->1389 1390 7ff6570ee62b-7ff6570ee652 CoCreateInstance 1387->1390 1407 7ff6570ee563-7ff6570ee56a 1388->1407 1392 7ff6570ee602-7ff6570ee605 1389->1392 1393 7ff6570ee629 1389->1393 1395 7ff6570ee684-7ff6570ee699 1390->1395 1396 7ff6570ee654-7ff6570ee65b 1390->1396 1392->1393 1400 7ff6570ee607-7ff6570ee60a 1392->1400 1393->1390 1398 7ff6570ee6a4-7ff6570ee6ab 1395->1398 1399 7ff6570ee69b-7ff6570ee6a2 1395->1399 1397 7ff6570ee660-7ff6570ee67f call 7ff6570812b4 1396->1397 1416 7ff6570ee73c-7ff6570ee73e 1397->1416 1404 7ff6570ee6c0-7ff6570ee6c3 1398->1404 1405 7ff6570ee6ad-7ff6570ee6b4 1398->1405 1399->1398 1403 7ff6570ee6b6 1399->1403 1400->1393 1406 7ff6570ee60c-7ff6570ee627 1400->1406 1403->1404 1409 7ff6570ee6c5-7ff6570ee6d9 call 7ff6570ee764 1404->1409 1410 7ff6570ee71e-7ff6570ee72e 1404->1410 1405->1403 1405->1404 1406->1390 1411 7ff6570ee56c-7ff6570ee56f 1407->1411 1412 7ff6570ee579-7ff6570ee580 1407->1412 1421 7ff6570ee6ec-7ff6570ee70b 1409->1421 1422 7ff6570ee6db-7ff6570ee6e7 1409->1422 1415 7ff6570ee730-7ff6570ee739 1410->1415 1410->1416 1411->1412 1413 7ff6570ee582-7ff6570ee585 1412->1413 1414 7ff6570ee58f-7ff6570ee5ae 1412->1414 1413->1414 1415->1416 1416->1407 1419 7ff6570ee744-7ff6570ee753 1416->1419 1419->1407 1425 7ff6570ee759-7ff6570ee75c ExitProcess 1419->1425 1421->1410 1427 7ff6570ee70d-7ff6570ee719 1421->1427 1422->1397 1427->1397
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: AddressProc$CreateErrorExitHandleInstanceLastModuleProcess
                                                                      • String ID: IsWow64Process$Wow64DisableWow64FsRedirection$Wow64EnableWow64FsRedirection$Wow64RevertWow64FsRedirection$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\xmlutil.cpp$failed XmlCreateElement$failed appendChild$failed to create XML DOM Document$failed to get handle to kernel32.dll$kernel32.dll
                                                                      • API String ID: 2124981135-1573969316
                                                                      • Opcode ID: 3a3a0705cff9729a3415d1fbb6121d6721b2fbf31080613fedebf341df0e5cb3
                                                                      • Instruction ID: 937ff8f5c232d7983c7fd7dc7305b7134ed491486bd81e7b1fef761db4575cd1
                                                                      • Opcode Fuzzy Hash: 3a3a0705cff9729a3415d1fbb6121d6721b2fbf31080613fedebf341df0e5cb3
                                                                      • Instruction Fuzzy Hash: 437115A2A18B4F85FB518F16E8402B923A4BF84B84F484536DE0DE3764EF3DE54AC344
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CloseCreateErrorFileHandleLastLocalSleepTime
                                                                      • String ID: %ls_%04u%02u%02u%02u%02u%02u%ls%ls%ls$.cleanroom$Failed to combine directory and log prefix.$Failed to concatenate the temp folder and log prefix.$Failed to copy temp path to return.$Failed to create temp file: %ls$Failed to ensure temp file path exists: %ls$Failed to get temp folder.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\pathutil.cpp$failed to allocate memory for the temp path
                                                                      • API String ID: 1968021109-1311207464
                                                                      • Opcode ID: a9a25b6a6b9427bdf062adbb32dc01eb6a8c5cc95c4f4c1224b79382711ae4cf
                                                                      • Instruction ID: 5d75343e125da8da4b173905ad9afd0c83f1ab181003a7e6ed22baa6e55f50a1
                                                                      • Opcode Fuzzy Hash: a9a25b6a6b9427bdf062adbb32dc01eb6a8c5cc95c4f4c1224b79382711ae4cf
                                                                      • Instruction Fuzzy Hash: CBA18162B08A168AF760CFA1E4502BD33E5AB44758F480235EE5DE3BD9EF3CD51A8744
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalCurrentSection$EnterLeaveLocalProcessThreadTime
                                                                      • String ID: %ls[%04X:%04X][%04hu-%02hu-%02huT%02hu:%02hu:%02hu]%hs%03d:%ls %ls%ls$Failed to convert log string to UTF-8$Failed to format line prefix.$Failed to write string to log using default function: %ls$Failed to write string to log using redirected function: %ls$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\logutil.cpp
                                                                      • API String ID: 296830338-1339504754
                                                                      • Opcode ID: da0a7884cb04d5e9f83e9fcd3f03ee76a610eedc8125c07f4e25616af8c08537
                                                                      • Instruction ID: a2fb5900e546ac8790e044af94c7f9f7989af8dbfed7638514f77f8fd292ac91
                                                                      • Opcode Fuzzy Hash: da0a7884cb04d5e9f83e9fcd3f03ee76a610eedc8125c07f4e25616af8c08537
                                                                      • Instruction Fuzzy Hash: 4B715072B0864A9AEB219F25E8802BA73E4FB44754F480136DE4DE7BA4DF3CE559C704
                                                                      APIs
                                                                      • FormatMessageW.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FF6570E8476), ref: 00007FF6570E7969
                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FF6570E8476), ref: 00007FF6570E7975
                                                                      • LocalFree.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FF6570E8476), ref: 00007FF6570E7A1B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFormatFreeLastLocalMessage
                                                                      • String ID: d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\logutil.cpp$failed to log id: %d
                                                                      • API String ID: 1365068426-1219654922
                                                                      • Opcode ID: 48a896860358c0d6d62c56415fe43e041647789efc5f0c3f15441eab9cd75975
                                                                      • Instruction ID: 70d859d713223da7d82361523463729049077a3b663eb7078958b33a03b5311d
                                                                      • Opcode Fuzzy Hash: 48a896860358c0d6d62c56415fe43e041647789efc5f0c3f15441eab9cd75975
                                                                      • Instruction Fuzzy Hash: 3031BE72B18B8A8AE7208F15E4441AD73A5FB88B50F98013ADB8DD3754DF38E949C744
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: DecryptFile
                                                                      • String ID: Failed to copy working folder.$No usable base working folder found.$d:\a\wix4\wix4\src\burn\engine\cache.cpp
                                                                      • API String ID: 3257575229-4136860833
                                                                      • Opcode ID: 33d9c878091376511f0b0b0cd26a57e041e4adcd3ab18688e2ccae335cfbaa40
                                                                      • Instruction ID: bde620f7c6fc9ed87cf910e1722d76431b1f30d9d1327438761a8e48f8dc5091
                                                                      • Opcode Fuzzy Hash: 33d9c878091376511f0b0b0cd26a57e041e4adcd3ab18688e2ccae335cfbaa40
                                                                      • Instruction Fuzzy Hash: 3631C476A18A8A87EB509F25E0403BAA3D1FBC4B98F5C4135EE4CDB659DF7CD0498700
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$ErrorFreeLastProcess
                                                                      • String ID:
                                                                      • API String ID: 406640338-0
                                                                      • Opcode ID: 030a6326adff4fd54b1e732239a6ba3d14283f1bf84e7b59afac754cae3bccc9
                                                                      • Instruction ID: bc32e3c0819de2b2cf55e7e0ad6a88c9aca911c37dbc90b98f7492fd3e620914
                                                                      • Opcode Fuzzy Hash: 030a6326adff4fd54b1e732239a6ba3d14283f1bf84e7b59afac754cae3bccc9
                                                                      • Instruction Fuzzy Hash: 71E0C2D0F0478B82F7106BFB288817111D06F4CB91F484034CE49DA350ED1CF88D4224

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CompareCriticalErrorInitializeLastSectionString
                                                                      • String ID: AdminToolsFolder$AppDataFolder$Attempted to add built-in variable again: %ls$Attempted to add built-in variable as a well-known variable: %ls$Attempted to add well-known variable again: %ls$CommonAppDataFolder$CommonFiles6432Folder$CommonFiles64Folder$CommonFilesFolder$CompatibilityMode$ComputerName$Date$DesktopFolder$Failed to add built-in variable: %ls.$Failed to add well-known variable: %ls.$Failed to find variable value.$Failed to insert variable.$FavoritesFolder$FontsFolder$InstallerInformationalVersion$InstallerName$InstallerVersion$LocalAppDataFolder$LogonUser$MyPicturesFolder$NTProductType$NTSuiteBackOffice$NTSuiteDataCenter$NTSuiteEnterprise$NTSuitePersonal$NTSuiteSmallBusiness$NTSuiteSmallBusinessRestricted$NTSuiteWebServer$NativeMachine$PersonalFolder$Privileged$ProcessorArchitecture$ProgramFiles6432Folder$ProgramFiles64Folder$ProgramFilesFolder$ProgramMenuFolder$RebootPending$SeShutdownPrivilege$SendToFolder$ServicePackLevel$StartMenuFolder$StartupFolder$System64Folder$SystemFolder$SystemLanguageID$TempFolder$TemplateFolder$TerminalServer$UserLanguageID$UserUILanguageID$VersionMsi$VersionNT$VersionNT64$WindowsBuildNumber$WindowsFolder$WindowsVolume$WixBundleAction$WixBundleActiveParent$WixBundleCommandLineAction$WixBundleElevated$WixBundleExecutePackageAction$WixBundleExecutePackageCacheFolder$WixBundleForcedRestartPackage$WixBundleInProgressName$WixBundleInstalled$WixBundleLastUsedSource$WixBundleLayoutDirectory$WixBundleManufacturer$WixBundleName$WixBundleOriginalSource$WixBundleOriginalSourceFolder$WixBundleProviderKey$WixBundleSourceProcessFolder$WixBundleSourceProcessPath$WixBundleTag$WixBundleUILevel$WixBundleVersion$WixCanRestart$d:\a\wix4\wix4\src\burn\engine\variable.cpp
                                                                      • API String ID: 4291812786-1743442426
                                                                      • Opcode ID: ff25b12800e485d587359f330c611961e772e9d31e999867e8fd1db8584435af
                                                                      • Instruction ID: ba2247f8b2eb7975a6851c1f0b61651b5220927d6f2bab7bf0c611bf80a7cc2c
                                                                      • Opcode Fuzzy Hash: ff25b12800e485d587359f330c611961e772e9d31e999867e8fd1db8584435af
                                                                      • Instruction Fuzzy Hash: F1826D72615FC59AD771CF24EC806DA33E9FB08348F54423AD68C9AB28EF399265C744

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 547 7ff6570b6e7c-7ff6570b6eb0 SetEvent 548 7ff6570b6ef2-7ff6570b6f02 call 7ff6570818f4 547->548 549 7ff6570b6eb2-7ff6570b6eed GetLastError call 7ff6570812b0 547->549 555 7ff6570b6f04-7ff6570b6f10 548->555 556 7ff6570b6f15-7ff6570b6f21 ResetEvent 548->556 554 7ff6570b7275 549->554 557 7ff6570b7277-7ff6570b727c 554->557 555->557 558 7ff6570b6f63-7ff6570b6f68 556->558 559 7ff6570b6f23-7ff6570b6f5e GetLastError call 7ff6570812b0 556->559 560 7ff6570b7280-7ff6570b7293 call 7ff6570812b4 557->560 562 7ff6570b6fae-7ff6570b6fc8 call 7ff6570837b4 558->562 563 7ff6570b6f6a-7ff6570b6f6d 558->563 559->554 570 7ff6570b7298-7ff6570b72be 560->570 572 7ff6570b7005-7ff6570b7011 SetEvent 562->572 573 7ff6570b6fca-7ff6570b7000 call 7ff6570812b4 562->573 566 7ff6570b6f6f-7ff6570b6f9f call 7ff6570812b0 563->566 567 7ff6570b6fa4-7ff6570b6fa9 563->567 566->560 567->570 576 7ff6570b7023-7ff6570b7033 call 7ff6570818f4 572->576 577 7ff6570b7013-7ff6570b7019 GetLastError 572->577 573->570 581 7ff6570b7035-7ff6570b7041 576->581 582 7ff6570b7046-7ff6570b7052 ResetEvent 576->582 577->576 581->557 583 7ff6570b7064-7ff6570b706a 582->583 584 7ff6570b7054-7ff6570b705a GetLastError 582->584 585 7ff6570b7070-7ff6570b7072 583->585 586 7ff6570b7104-7ff6570b7136 CreateFileW 583->586 584->583 587 7ff6570b7074-7ff6570b7076 585->587 588 7ff6570b70bc-7ff6570b70c1 call 7ff657086828 585->588 589 7ff6570b7183-7ff6570b7197 SetFilePointerEx 586->589 590 7ff6570b7138-7ff6570b7177 GetLastError call 7ff6570812b0 586->590 591 7ff6570b70b5-7ff6570b70b7 587->591 592 7ff6570b7078-7ff6570b707a 587->592 602 7ff6570b70c6-7ff6570b70cd 588->602 593 7ff6570b71d9-7ff6570b71e5 SetEndOfFile 589->593 594 7ff6570b7199-7ff6570b71d4 GetLastError call 7ff6570812b0 589->594 590->589 591->570 592->567 598 7ff6570b7080-7ff6570b70b0 call 7ff6570812b0 592->598 600 7ff6570b7224-7ff6570b7238 SetFilePointerEx 593->600 601 7ff6570b71e7-7ff6570b7222 GetLastError call 7ff6570812b0 593->601 594->554 598->560 600->570 608 7ff6570b723a-7ff6570b726e GetLastError call 7ff6570812b0 600->608 601->554 606 7ff6570b70cf-7ff6570b70f1 call 7ff6570812b0 602->606 607 7ff6570b70f6-7ff6570b70ff 602->607 606->554 607->570 608->554
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorEventLast
                                                                      • String ID: Failed to allocate buffer for stream.$Failed to copy stream name: %hs$Failed to create file: %ls$Failed to reset begin operation event.$Failed to set end of file.$Failed to set file pointer to beginning of file.$Failed to set file pointer to end of file.$Failed to set operation complete event.$Failed to wait for begin operation event.$Invalid operation for this state.$d:\a\wix4\wix4\src\burn\engine\cabextract.cpp
                                                                      • API String ID: 3848097054-1884393483
                                                                      • Opcode ID: a8b74cfa495588d78009c4780292179a37fd0ced6149dcba000e61800993c851
                                                                      • Instruction ID: 1462396d787d8f991477e9a723bac53fce93b736c0690ac7beb0594905df0b7b
                                                                      • Opcode Fuzzy Hash: a8b74cfa495588d78009c4780292179a37fd0ced6149dcba000e61800993c851
                                                                      • Instruction Fuzzy Hash: 4FC172A1B18B5ACAFB208F65E48077922E4BF58B50F48113ADA4DE7791DF2CF9198344

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 701 7ff6570f64c8-7ff6570f6508 call 7ff657081a28 704 7ff6570f653a-7ff6570f6559 GetProcAddress 701->704 705 7ff6570f650a-7ff6570f6511 701->705 707 7ff6570f655f-7ff6570f6575 GetCurrentProcess call 7ff6570e96bc 704->707 708 7ff6570f65f6-7ff6570f661d call 7ff6570ea65c 704->708 706 7ff6570f6516-7ff6570f6535 call 7ff6570812b4 705->706 715 7ff6570f679a-7ff6570f67a1 706->715 718 7ff6570f6585-7ff6570f6589 707->718 719 7ff6570f6577-7ff6570f6583 707->719 716 7ff6570f661f-7ff6570f6626 708->716 717 7ff6570f6628-7ff6570f662a 708->717 720 7ff6570f67a3-7ff6570f67a9 RegCloseKey 715->720 721 7ff6570f67ae-7ff6570f67b5 715->721 722 7ff6570f662c-7ff6570f662e 716->722 717->722 718->708 723 7ff6570f658b-7ff6570f659f call 7ff6570f1370 718->723 719->706 720->721 724 7ff6570f67bc-7ff6570f67ce 721->724 725 7ff6570f67b7 call 7ff657084278 721->725 726 7ff6570f6630-7ff6570f6637 722->726 727 7ff6570f6641-7ff6570f6643 722->727 734 7ff6570f65b2-7ff6570f65ce call 7ff6570869ec 723->734 735 7ff6570f65a1-7ff6570f65ad 723->735 725->724 726->727 730 7ff6570f6732-7ff6570f6746 call 7ff6570f1370 727->730 731 7ff6570f6649-7ff6570f6661 call 7ff6570f63b0 727->731 743 7ff6570f6748-7ff6570f674f 730->743 744 7ff6570f6759-7ff6570f6772 call 7ff6570869ec 730->744 740 7ff6570f6674-7ff6570f6677 731->740 741 7ff6570f6663-7ff6570f666a 731->741 745 7ff6570f65d0-7ff6570f65dc 734->745 746 7ff6570f65e1-7ff6570f65f3 734->746 735->706 747 7ff6570f66bd-7ff6570f66cc call 7ff6570f63b0 740->747 748 7ff6570f6679-7ff6570f6695 call 7ff6570869ec 740->748 741->740 743->744 755 7ff6570f6774-7ff6570f677b 744->755 756 7ff6570f6785-7ff6570f6797 744->756 745->706 746->708 754 7ff6570f66d1-7ff6570f66d5 747->754 757 7ff6570f66a8-7ff6570f66ba 748->757 758 7ff6570f6697-7ff6570f669e 748->758 759 7ff6570f66e8-7ff6570f66eb 754->759 760 7ff6570f66d7-7ff6570f66de 754->760 755->756 756->715 757->747 758->757 759->730 761 7ff6570f66ed-7ff6570f6709 call 7ff6570869ec 759->761 760->759 764 7ff6570f671c-7ff6570f672f 761->764 765 7ff6570f670b-7ff6570f6712 761->765 764->730 765->764
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: AddressCloseCurrentErrorLastLibraryLoadProcProcess
                                                                      • String ID: Failed to check if running as system.$Failed to ensure array size for Windows\SystemTemp value.$Failed to ensure array size for Windows\TEMP value.$Failed to ensure array size for system TEMP value.$Failed to ensure array size for system TMP value.$Failed to get system Windows subdirectory path SystemTemp.$Failed to get system Windows subdirectory path TEMP.$Failed to get temp path from system TEMP.$Failed to get temp path from system TMP.$Failed to load kernel32.dll$Failed to open system environment registry key.$GetTempPath2W$SystemTemp$System\CurrentControlSet\Control\Session Manager\Environment$TEMP$TMP$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\path3utl.cpp$kernel32.dll
                                                                      • API String ID: 1593934338-44121869
                                                                      • Opcode ID: d7143471ebef5ca8d24d0d61062df50fdf6e171436cab278c51ccfab9e12d296
                                                                      • Instruction ID: 2f379886ae39cb343f6cc76c337626788fe4412b848f92e9d05585bbe428b540
                                                                      • Opcode Fuzzy Hash: d7143471ebef5ca8d24d0d61062df50fdf6e171436cab278c51ccfab9e12d296
                                                                      • Instruction Fuzzy Hash: 3C9182A2B08B0B86EB20CF25D8807B923A4BB45788F584131DA0DE7799EF7DE519C744

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: AddressProc
                                                                      • String ID: Failed to load Msi.DLL$Msi.dll$MsiBeginTransactionW$MsiDetermineApplicablePatchesW$MsiDeterminePatchSequenceW$MsiEndTransaction$MsiEnumProductsExW$MsiGetPatchInfoExW$MsiGetProductInfoExW$MsiSetExternalUIRecord$MsiSourceListAddSourceExW$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\wiutil.cpp
                                                                      • API String ID: 190572456-4147843358
                                                                      • Opcode ID: f2c52ce2770bdf847672b515e1dc474f5a71dca2f0b65a746359447ebc4db83c
                                                                      • Instruction ID: 50c83f57d7125e65d292d4aa2c0201344ff0d4d96d78a207a3d262c56b71f2a4
                                                                      • Opcode Fuzzy Hash: f2c52ce2770bdf847672b515e1dc474f5a71dca2f0b65a746359447ebc4db83c
                                                                      • Instruction Fuzzy Hash: 4C517DA0A19A4F89EF24DB51FC9427423A4BF84B84F4C0539D94EE7220EF7CA559C364

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1326 7ff65708be2c-7ff65708be74 EnterCriticalSection call 7ff657089b6c 1329 7ff65708be76-7ff65708be82 1326->1329 1330 7ff65708be87-7ff65708be8a 1326->1330 1331 7ff65708c04e-7ff65708c06f call 7ff6570812b4 1329->1331 1332 7ff65708beb6-7ff65708bec9 1330->1332 1333 7ff65708be8c-7ff65708bea3 call 7ff65708bbfc 1330->1333 1341 7ff65708c074-7ff65708c07f LeaveCriticalSection 1331->1341 1334 7ff65708bf15-7ff65708bf1d 1332->1334 1335 7ff65708becb-7ff65708bece 1332->1335 1349 7ff65708bf0f 1333->1349 1350 7ff65708bea5-7ff65708beb1 1333->1350 1339 7ff65708c022-7ff65708c040 call 7ff6570b6394 1334->1339 1340 7ff65708bf23-7ff65708bf34 1334->1340 1335->1334 1338 7ff65708bed0-7ff65708bed3 1335->1338 1343 7ff65708bed5-7ff65708beda 1338->1343 1344 7ff65708bedc-7ff65708bedf 1338->1344 1339->1341 1359 7ff65708c042-7ff65708c049 1339->1359 1340->1339 1346 7ff65708bf3a-7ff65708bf40 1340->1346 1347 7ff65708c081-7ff65708c089 1341->1347 1348 7ff65708c0a2-7ff65708c0bc 1341->1348 1343->1334 1343->1344 1352 7ff65708bee1-7ff65708bee4 1344->1352 1353 7ff65708bee6-7ff65708bf0a call 7ff6570812b0 1344->1353 1355 7ff65708bf4e-7ff65708bf53 1346->1355 1356 7ff65708bf42-7ff65708bf49 1346->1356 1347->1348 1351 7ff65708c08b-7ff65708c09d call 7ff65708c0c0 1347->1351 1349->1334 1350->1331 1351->1348 1352->1334 1352->1353 1353->1331 1361 7ff65708bfe2-7ff65708bfe8 1355->1361 1362 7ff65708bf59-7ff65708bf5c 1355->1362 1360 7ff65708bff1-7ff65708bff4 1356->1360 1359->1331 1365 7ff65708bff7 call 7ff65708c0c0 1360->1365 1367 7ff65708bfea 1361->1367 1368 7ff65708bffc-7ff65708c000 1361->1368 1363 7ff65708bf5e-7ff65708bf61 1362->1363 1364 7ff65708bfab-7ff65708bfb1 1362->1364 1369 7ff65708bf63-7ff65708bf66 1363->1369 1370 7ff65708bf94-7ff65708bfa1 1363->1370 1364->1367 1373 7ff65708bfb3-7ff65708bfdb call 7ff65708c0c0 1364->1373 1365->1368 1367->1360 1368->1339 1372 7ff65708c002-7ff65708c008 1368->1372 1369->1364 1374 7ff65708bf68-7ff65708bf6b 1369->1374 1376 7ff65708bfa4-7ff65708bfa9 call 7ff65708c0c0 1370->1376 1372->1339 1375 7ff65708c00a-7ff65708c00e 1372->1375 1381 7ff65708bfe0 1373->1381 1374->1368 1378 7ff65708bf71-7ff65708bf7d 1374->1378 1375->1339 1379 7ff65708c010-7ff65708c01d call 7ff657089b38 1375->1379 1376->1368 1382 7ff65708bf7f-7ff65708bf86 1378->1382 1383 7ff65708bf88-7ff65708bf92 1378->1383 1379->1339 1381->1368 1382->1365 1383->1376
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalSection$CompareEnterErrorLastLeaveString_cwprintf_s_l
                                                                      • String ID: Attempt to set built-in variable value: %ls$Failed to find variable value '%ls'.$Failed to insert variable '%ls'.$Failed to set value of variable: %ls$Setting %ls variable '%ls' to value '%ls'$Setting hidden variable '%ls'$Setting numeric variable '%ls' to value %lld$Setting variable failed: ID '%ls', HRESULT 0x%x$Setting version variable '%ls' to value '%ls'$Unsetting variable '%ls'$d:\a\wix4\wix4\src\burn\engine\variable.cpp$formatted$string
                                                                      • API String ID: 1673681053-2464245954
                                                                      • Opcode ID: d386d69a2b529bec333ce1dafe3e38c3269cf61878943cdff6c6323a97eab7b2
                                                                      • Instruction ID: 3f39e9a41597886475cfec0ce3888711a4b4f7b835b742b777a112eee78e3d7d
                                                                      • Opcode Fuzzy Hash: d386d69a2b529bec333ce1dafe3e38c3269cf61878943cdff6c6323a97eab7b2
                                                                      • Instruction Fuzzy Hash: 7E7192B1B0874A82EA34AB06E48427A63E1BF457D4F4C413ADA5DE77A5DF3CE549CB00

                                                                      Control-flow Graph

                                                                      APIs
                                                                        • Part of subcall function 00007FF657081A28: LoadLibraryExW.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6570811A9), ref: 00007FF657081A58
                                                                        • Part of subcall function 00007FF657081A28: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6570811A9), ref: 00007FF657081A66
                                                                      • GetProcAddressForCaller.KERNELBASE(?,?,?,?,00000000,00007FF6570895EE), ref: 00007FF6570E7715
                                                                      • GetProcAddress.KERNEL32(?,?,?,?,00000000,00007FF6570895EE), ref: 00007FF6570E7730
                                                                      • GetProcAddress.KERNEL32(?,?,?,?,00000000,00007FF6570895EE), ref: 00007FF6570E77B0
                                                                      • GetLastError.KERNEL32(?,?,?,?,00000000,00007FF6570895EE), ref: 00007FF6570E77CC
                                                                      • GetProcAddress.KERNEL32(?,?,?,?,00000000,00007FF6570895EE), ref: 00007FF6570E781D
                                                                      • GetLastError.KERNEL32(?,?,?,?,00000000,00007FF6570895EE), ref: 00007FF6570E7839
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: AddressProc$ErrorLast$CallerLibraryLoad
                                                                      • String ID: AdvApi32.dll$Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory$Failed to load Crypt32.dll$Failed to load a decryption method$Failed to load an encryption method$SystemFunction040$SystemFunction041$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\cryputil.cpp
                                                                      • API String ID: 1485715633-402918305
                                                                      • Opcode ID: c8d754dcebb0bcdda32ceb95da721a5f4649e71f8044152adca076483cb7a98f
                                                                      • Instruction ID: 8fc06bfbecb515750b45ff97aab447a39cdd470b02a1445dc1d43ccb049e5dc1
                                                                      • Opcode Fuzzy Hash: c8d754dcebb0bcdda32ceb95da721a5f4649e71f8044152adca076483cb7a98f
                                                                      • Instruction Fuzzy Hash: 2141F8A4A1DA4F89FF618B15EC8037422E5AF54785F9C5136C80EF66A0EFBDE949C310

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1454 7ff6570b72c0-7ff6570b72fa CoInitializeEx 1455 7ff6570b732c-7ff6570b73a2 call 7ff6570fd68a 1454->1455 1456 7ff6570b72fc-7ff6570b7327 call 7ff6570812b4 1454->1456 1461 7ff6570b73a4-7ff6570b73e5 call 7ff6570812b0 call 7ff6570812b4 1455->1461 1462 7ff6570b73ea-7ff6570b741d call 7ff6570fd715 1455->1462 1463 7ff6570b767a-7ff6570b769a call 7ff6570d3b50 1456->1463 1480 7ff6570b7674 CoUninitialize 1461->1480 1471 7ff6570b7423-7ff6570b742f 1462->1471 1472 7ff6570b754c-7ff6570b7558 SetEvent 1462->1472 1474 7ff6570b7435-7ff6570b743b 1471->1474 1475 7ff6570b766c-7ff6570b766f call 7ff6570fd727 1471->1475 1476 7ff6570b75bf-7ff6570b75cf call 7ff6570818f4 1472->1476 1477 7ff6570b755a-7ff6570b7590 GetLastError call 7ff6570812b0 1472->1477 1474->1475 1481 7ff6570b7441-7ff6570b744c 1474->1481 1475->1480 1487 7ff6570b75d1-7ff6570b75dd 1476->1487 1488 7ff6570b75df-7ff6570b75eb ResetEvent 1476->1488 1492 7ff6570b7597 1477->1492 1480->1463 1484 7ff6570b7452-7ff6570b7455 1481->1484 1485 7ff6570b7509-7ff6570b7547 call 7ff6570812b4 1481->1485 1490 7ff6570b7457-7ff6570b7468 1484->1490 1491 7ff6570b746d-7ff6570b7470 1484->1491 1485->1475 1493 7ff6570b7599-7ff6570b75ba call 7ff6570812b4 1487->1493 1494 7ff6570b762f-7ff6570b7635 1488->1494 1495 7ff6570b75ed-7ff6570b762a GetLastError call 7ff6570812b0 1488->1495 1497 7ff6570b7505-7ff6570b7507 1490->1497 1498 7ff6570b74c4-7ff6570b74c9 1491->1498 1499 7ff6570b7472 1491->1499 1492->1493 1493->1475 1502 7ff6570b7667 1494->1502 1503 7ff6570b7637-7ff6570b763a 1494->1503 1495->1492 1497->1472 1497->1485 1504 7ff6570b7500 1498->1504 1505 7ff6570b74cb-7ff6570b74ce 1498->1505 1506 7ff6570b7474-7ff6570b7478 1499->1506 1507 7ff6570b74bd-7ff6570b74c2 1499->1507 1502->1475 1512 7ff6570b7663-7ff6570b7665 1503->1512 1513 7ff6570b763c-7ff6570b765e call 7ff6570812b0 1503->1513 1504->1497 1514 7ff6570b74d0-7ff6570b74d3 1505->1514 1515 7ff6570b74f9-7ff6570b74fe 1505->1515 1508 7ff6570b74b6-7ff6570b74bb 1506->1508 1509 7ff6570b747a-7ff6570b747d 1506->1509 1507->1485 1508->1485 1516 7ff6570b74af-7ff6570b74b4 1509->1516 1517 7ff6570b747f-7ff6570b7482 1509->1517 1512->1475 1513->1492 1519 7ff6570b74d5-7ff6570b74d8 1514->1519 1520 7ff6570b74f2-7ff6570b74f7 1514->1520 1515->1485 1516->1485 1523 7ff6570b7484-7ff6570b7487 1517->1523 1524 7ff6570b74a8-7ff6570b74ad 1517->1524 1521 7ff6570b74da-7ff6570b74dd 1519->1521 1522 7ff6570b74eb-7ff6570b74f0 1519->1522 1520->1485 1526 7ff6570b74df-7ff6570b74e4 1521->1526 1527 7ff6570b74e6-7ff6570b74e9 1521->1527 1522->1485 1528 7ff6570b74a1-7ff6570b74a6 1523->1528 1529 7ff6570b7489-7ff6570b748c 1523->1529 1524->1485 1526->1485 1527->1485 1528->1485 1530 7ff6570b748e-7ff6570b7491 1529->1530 1531 7ff6570b749a-7ff6570b749f 1529->1531 1530->1526 1532 7ff6570b7493-7ff6570b7498 1530->1532 1531->1485 1532->1485
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: InitializeUninitialize
                                                                      • String ID: <the>.cab$Failed to extract all files from container, erf: %d:%X:%d$Failed to initialize COM.$Failed to initialize cabinet.dll.$Failed to reset begin operation event.$Failed to set operation complete event.$Failed to wait for begin operation event.$Invalid operation for this state.$d:\a\wix4\wix4\src\burn\engine\cabextract.cpp
                                                                      • API String ID: 3442037557-242603754
                                                                      • Opcode ID: 7adcdc5a8a9af30590740795bf714f35760b2b2a20ca7a4185b08767b44b0a21
                                                                      • Instruction ID: e5f107762d80da4f855b34bc94e65ce288ef18c6a122c86398a617c39e6e46dd
                                                                      • Opcode Fuzzy Hash: 7adcdc5a8a9af30590740795bf714f35760b2b2a20ca7a4185b08767b44b0a21
                                                                      • Instruction Fuzzy Hash: CEB19DB1B0C60B86E7258B15E49067D26E4BF48740F5C123BDA4EE7B94DF6DFA088704
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: DloadSection$AccessWrite$ExceptionProtectRaiseRelease$AcquireErrorLastLibraryLoad
                                                                      • String ID: H
                                                                      • API String ID: 282135826-2852464175
                                                                      • Opcode ID: 4e34e669640002ee8d01061e8b33f596ebf32558e760d5e641b27431fa9a45f2
                                                                      • Instruction ID: ac0bcdd9f24f697521ea97c559cd9764fdb21bde45273295a99ec1619b5a24d2
                                                                      • Opcode Fuzzy Hash: 4e34e669640002ee8d01061e8b33f596ebf32558e760d5e641b27431fa9a45f2
                                                                      • Instruction Fuzzy Hash: 42911CB2A05B5A96EB54CF65D8486AC33E1FB08B58F0C5439DE0DA7754EF38E449C708
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Close$Handle$MessagePostWindow
                                                                      • String ID: "%ls" %ls$Failed to allocate full command-line.$Failed to cache to clean room.$Failed to create clean room command-line.$Failed to get path for current process.$Failed to launch clean room process: %ls$Failed to open clean room log.$Failed to wait for clean room process: %ls$d:\a\wix4\wix4\src\burn\engine\engine.cpp
                                                                      • API String ID: 417716614-4161841978
                                                                      • Opcode ID: bae6123957e4273f7784ba016ea0feb86eda75a7a8ff06c76d11c23fb709da8a
                                                                      • Instruction ID: 658287bfcda07b6d872c722a35727ab439d7cf671fcacaf861b1473d9994fb47
                                                                      • Opcode Fuzzy Hash: bae6123957e4273f7784ba016ea0feb86eda75a7a8ff06c76d11c23fb709da8a
                                                                      • Instruction Fuzzy Hash: 94817D62B28A5A8AFB109F61D8507F923A4FB44798F480231EA1DE7B95DF3CE159C300
                                                                      APIs
                                                                      • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,00000002,?,?,00007FF65709EFD4,?,?,?,00000000), ref: 00007FF6570E84E5
                                                                      • LeaveCriticalSection.KERNEL32 ref: 00007FF6570E874E
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalSection$EnterLeave
                                                                      • String ID: Failed to combine the log path.$Failed to copy log path.$Failed to create log based on current system time.$Failed to ensure log file directory exists: %ls$Failed to expand the log path.$Failed to get log directory.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\logutil.cpp$failed to create log file: %ls
                                                                      • API String ID: 3168844106-925379867
                                                                      • Opcode ID: 2e734120651806f2d16b40ebd5d3df471a4e83a6027f22c6eb85f537bd505229
                                                                      • Instruction ID: cf9c176ed7549c1d7ac8573f7f804a5439519d984ca4a10ed126b55e7e14b9f3
                                                                      • Opcode Fuzzy Hash: 2e734120651806f2d16b40ebd5d3df471a4e83a6027f22c6eb85f537bd505229
                                                                      • Instruction Fuzzy Hash: D8816DA2B08A0F86EB20DF65E8905B923E4AF84794F4C1535DD5DE7BA4DF3CE4488740
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$CurrentFileProcess$CreateDuplicateHandlePointer
                                                                      • String ID: Failed to duplicate handle to container: %ls$Failed to move file pointer to container offset.$Failed to open container.$Failed to open file: %ls$d:\a\wix4\wix4\src\burn\engine\container.cpp
                                                                      • API String ID: 2619879409-4109612866
                                                                      • Opcode ID: 580a574426d25143b1fe845e18140cefabf155fe4583366fdbb8ba1263da41e5
                                                                      • Instruction ID: 8eba8d7db4839689a54612833400ed0ba25dd4a30702a5ac8eabdb72bf4dbbcb
                                                                      • Opcode Fuzzy Hash: 580a574426d25143b1fe845e18140cefabf155fe4583366fdbb8ba1263da41e5
                                                                      • Instruction Fuzzy Hash: AF51ADB2B28B66C6E720CB16E84466922E4FB18B90F590139DD4DE3790DF3CE959C784
                                                                      APIs
                                                                        • Part of subcall function 00007FF65708543C: SetLastError.KERNEL32(?,?,?,?,?,00007FF657081155), ref: 00007FF657085462
                                                                        • Part of subcall function 00007FF65708543C: GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF657081155), ref: 00007FF657085474
                                                                        • Part of subcall function 00007FF65708543C: GetLastError.KERNEL32(?,?,?,?,?,00007FF657081155), ref: 00007FF65708547E
                                                                      • CreateFileW.KERNELBASE ref: 00007FF65708117F
                                                                        • Part of subcall function 00007FF657081728: HeapSetInformation.KERNEL32 ref: 00007FF657081749
                                                                        • Part of subcall function 00007FF657081728: GetLastError.KERNEL32 ref: 00007FF65708176F
                                                                        • Part of subcall function 00007FF657081728: GetLastError.KERNEL32 ref: 00007FF65708179C
                                                                      • CloseHandle.KERNEL32 ref: 00007FF6570811FD
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$File$CloseCreateHandleHeapInformationModuleName
                                                                      • String ID: D:\a\wix4\wix4\src\burn\stub\stub.cpp$Failed to run application.$cabinet.dll$clbcatq.dll$comres.dll$crypt32.dll$feclient.dll$msasn1.dll$msi.dll$version.dll$wininet.dll
                                                                      • API String ID: 1668717245-1077387440
                                                                      • Opcode ID: 3ccf7bc6d4935e85ba92efac8401e58cf0f84e35340b10170e0968822d1386aa
                                                                      • Instruction ID: f5114f1ee1eef9a54021570e1f3e298c0c0b8ed8a3671fc3d1f9f7b89ad5b1e0
                                                                      • Opcode Fuzzy Hash: 3ccf7bc6d4935e85ba92efac8401e58cf0f84e35340b10170e0968822d1386aa
                                                                      • Instruction Fuzzy Hash: C6413CB2B19B4699FB10DB61E8503A933E4AF48768F480235DD5DE2794EF3CE119C344
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentErrorLastProcess$CompareCreateDuplicateFileHandleString
                                                                      • String ID: <the>.cab$Failed to add virtual file pointer for cab container.$Failed to duplicate handle to cab container.$Failed to open cabinet file: %hs$d:\a\wix4\wix4\src\burn\engine\cabextract.cpp
                                                                      • API String ID: 3030546534-373254902
                                                                      • Opcode ID: 36aeb0f077e8e6d3bcab6fa8a93048137311a701b94667b809691f3c98990815
                                                                      • Instruction ID: 698b5ebe64f3eafc4141375ef8177a1e1190ce4f4b9951831c7c3be5dd0137a5
                                                                      • Opcode Fuzzy Hash: 36aeb0f077e8e6d3bcab6fa8a93048137311a701b94667b809691f3c98990815
                                                                      • Instruction Fuzzy Hash: A751C2B1B18B4582E710CF51E48076A27E4FB48B90F480239DA9DD3794CF7CE519C744
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CreateErrorEventLast
                                                                      • String ID: Failed to copy file name.$Failed to create begin operation event.$Failed to create extraction thread.$Failed to create operation complete event.$Failed to wait for operation complete.$d:\a\wix4\wix4\src\burn\engine\cabextract.cpp
                                                                      • API String ID: 545576003-2441605526
                                                                      • Opcode ID: ec51110445c90a18dd0a850491692b75788af5036563afb27417c28084b248ce
                                                                      • Instruction ID: 6760a7c4074dfd12e620a297ff28f269ec55af32836cc965ab952d9a61b73e1b
                                                                      • Opcode Fuzzy Hash: ec51110445c90a18dd0a850491692b75788af5036563afb27417c28084b248ce
                                                                      • Instruction Fuzzy Hash: 4F41C4A1B1874A8AF7609B79E48077922D4BF98760F58113AD90DE7791DF3CF6198304
                                                                      APIs
                                                                        • Part of subcall function 00007FF657081A28: LoadLibraryExW.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6570811A9), ref: 00007FF657081A58
                                                                        • Part of subcall function 00007FF657081A28: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6570811A9), ref: 00007FF657081A66
                                                                      • CoTaskMemFree.OLE32 ref: 00007FF6570F1D62
                                                                      • FreeLibrary.KERNEL32 ref: 00007FF6570F1D72
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: FreeLibrary$ErrorLastLoadTask
                                                                      • String ID: Failed to backslash terminate shell folder path: %ls$Failed to copy shell folder path: %ls$Failed to find SHGetKnownFolderPath entry point.$Failed to get known folder path.$Failed to load shell32.dll.$SHGetKnownFolderPath$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\shelutil.cpp$shell32.dll
                                                                      • API String ID: 3444712580-2659096373
                                                                      • Opcode ID: 744b55a3f1a22f1e5c26f0793c575aa380f9337dbc3496ecdbd2fdf977bea8a8
                                                                      • Instruction ID: 7ba3b631823d0d1ea6cfa05cb3f53e06b02caa1865cd1f6fcebf54d86fd2b4cf
                                                                      • Opcode Fuzzy Hash: 744b55a3f1a22f1e5c26f0793c575aa380f9337dbc3496ecdbd2fdf977bea8a8
                                                                      • Instruction Fuzzy Hash: E9414FA1B1CB4A82EB108B12E48037927A1EF89790F484136D94DE7B64DF3DE549CB48
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentHandleProcess$CloseDuplicateErrorLast
                                                                      • String ID: -%ls=%Iu$Failed to append the file handle to the command line.$Failed to duplicate file handle for attached container.$burn.filehandle.attached$d:\a\wix4\wix4\src\burn\engine\core.cpp
                                                                      • API String ID: 4224961946-761155037
                                                                      • Opcode ID: 05a9ff7a00f17664ffa273747c6835349083bcbaf57dd01e3c6d1667ddbf1e4f
                                                                      • Instruction ID: 59a22d17a95f66819ffc3eeea7b520eea1f2cd1f214363cdddb9f8780921b240
                                                                      • Opcode Fuzzy Hash: 05a9ff7a00f17664ffa273747c6835349083bcbaf57dd01e3c6d1667ddbf1e4f
                                                                      • Instruction Fuzzy Hash: E931A1B1B08B4686EB109F16E88026A77A4BB887A4F580235DE4DE37A4DF7CE059C744
                                                                      APIs
                                                                      • EnterCriticalSection.KERNEL32(?,?,?,?,?,00000000,00000001,00007FF6570E7C45), ref: 00007FF6570E8898
                                                                      • WriteFile.KERNELBASE(?,?,?,?,?,00000000,00000001,00007FF6570E7C45), ref: 00007FF6570E8990
                                                                      • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000001,00007FF6570E7C45), ref: 00007FF6570E899A
                                                                      • LeaveCriticalSection.KERNEL32(?,?,?,?,?,00000000,00000001,00007FF6570E7C45), ref: 00007FF6570E8A19
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalSection$EnterErrorFileLastLeaveWrite
                                                                      • String ID: Failed to concatenate string to pre-init buffer$Failed to get length of raw string$Failed to write output to log: %ls - %hs$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\logutil.cpp
                                                                      • API String ID: 1726892732-492501437
                                                                      • Opcode ID: c1764fad8848d23bf1665b4f293170b41e4aa1ba0d3e3a119a87483487ba6b30
                                                                      • Instruction ID: 2facbef1202debc593afc668ddef0f5045fb87f94e87425d654dc69bfc26dd49
                                                                      • Opcode Fuzzy Hash: c1764fad8848d23bf1665b4f293170b41e4aa1ba0d3e3a119a87483487ba6b30
                                                                      • Instruction Fuzzy Hash: 4841ADA1F18A4F85EB219F26E8801796291AF947A0F5C1235DD5DF7BE4DF3CE9098700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CreateDirectoryErrorLast$AttributesFile
                                                                      • String ID: \$cannot find parent path$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\dirutil.cpp$failed to create path: %ls
                                                                      • API String ID: 925696554-4176349969
                                                                      • Opcode ID: f1714b901ff161b150b00ad0a6fb30e36d1d53899da701369655220b220eef56
                                                                      • Instruction ID: 7d0ed33f44d62fb4d98cf68470024bdcd0054a49fc125c5a33fb96a1a6819bf3
                                                                      • Opcode Fuzzy Hash: f1714b901ff161b150b00ad0a6fb30e36d1d53899da701369655220b220eef56
                                                                      • Instruction Fuzzy Hash: C141A2A1B0C74A8AEB209B52A59027A72D2BF84BC0F4C5031DA4DF7759EF3CE959C744
                                                                      APIs
                                                                      • InitializeCriticalSection.KERNEL32(?,?,?,?,00000000,00007FF657089589), ref: 00007FF657088056
                                                                      • InitializeCriticalSection.KERNEL32(?,?,?,?,00000000,00007FF657089589), ref: 00007FF657088063
                                                                      • InitializeCriticalSection.KERNEL32(?,?,?,?,00000000,00007FF657089589), ref: 00007FF65708807A
                                                                      • GetCurrentProcess.KERNEL32(?,?,?,?,00000000,00007FF657089589), ref: 00007FF65708809E
                                                                        • Part of subcall function 00007FF6570E8E18: OpenProcessToken.ADVAPI32(?,?,?,?,?,?,?,00007FF6570880B3,?,?,?,?,00000000,00007FF657089589), ref: 00007FF6570E8E3A
                                                                        • Part of subcall function 00007FF6570E8E18: GetLastError.KERNEL32(?,?,?,?,?,?,?,00007FF6570880B3,?,?,?,?,00000000,00007FF657089589), ref: 00007FF6570E8E44
                                                                        • Part of subcall function 00007FF6570E8E18: CloseHandle.KERNELBASE(?,?,?,?,?,?,?,00007FF6570880B3,?,?,?,?,00000000,00007FF657089589), ref: 00007FF6570E8F25
                                                                        • Part of subcall function 00007FF6570AB24C: CompareStringW.KERNEL32 ref: 00007FF6570AB2D8
                                                                        • Part of subcall function 00007FF6570AB24C: CompareStringW.KERNEL32 ref: 00007FF6570AB30B
                                                                        • Part of subcall function 00007FF6570AB24C: CompareStringW.KERNEL32 ref: 00007FF6570AB33F
                                                                        • Part of subcall function 00007FF6570AB24C: CompareStringW.KERNEL32 ref: 00007FF6570AB373
                                                                        • Part of subcall function 00007FF6570AB24C: CompareStringW.KERNEL32 ref: 00007FF6570AB3A7
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CompareString$CriticalInitializeSection$Process$CloseCurrentErrorHandleLastOpenToken
                                                                      • String ID: Failed to initialize engine section.$Failed to initialize internal cache functionality.$Fatal error while parsing command line.$d:\a\wix4\wix4\src\burn\engine\engine.cpp
                                                                      • API String ID: 268551788-2320754317
                                                                      • Opcode ID: 42432ae88bd107c23b7aa40bb498d589d0f96d6003efd884acea9435c5eee8fc
                                                                      • Instruction ID: a5096d99fd0a88daa2083af289ff772317f076e9bb15186714c24590c09518a4
                                                                      • Opcode Fuzzy Hash: 42432ae88bd107c23b7aa40bb498d589d0f96d6003efd884acea9435c5eee8fc
                                                                      • Instruction Fuzzy Hash: 0C31A371709B8685EB20DF51E8406E933A4FB49798F480231DA5CE7B95EF7CE25AC300
                                                                      APIs
                                                                      • OpenProcessToken.ADVAPI32(?,?,?,?,?,?,?,00007FF6570880B3,?,?,?,?,00000000,00007FF657089589), ref: 00007FF6570E8E3A
                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,00007FF6570880B3,?,?,?,?,00000000,00007FF657089589), ref: 00007FF6570E8E44
                                                                      • GetTokenInformation.KERNELBASE(?,?,?,?,?,?,?,00007FF6570880B3,?,?,?,?,00000000,00007FF657089589), ref: 00007FF6570E8E9F
                                                                      • CloseHandle.KERNELBASE(?,?,?,?,?,?,?,00007FF6570880B3,?,?,?,?,00000000,00007FF657089589), ref: 00007FF6570E8F25
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Token$CloseErrorHandleInformationLastOpenProcess
                                                                      • String ID: Failed to get elevation token from process.$Failed to open process token.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\procutil.cpp
                                                                      • API String ID: 3370771294-1812211342
                                                                      • Opcode ID: 38ed1fb0a8f90a3d5dfb85c646750d73fb2bfd1109399e7609f7eff655dcee40
                                                                      • Instruction ID: 8e49a5550862baf76787ede5dd27bfc72ec2ff251097671a31dab48478619caf
                                                                      • Opcode Fuzzy Hash: 38ed1fb0a8f90a3d5dfb85c646750d73fb2bfd1109399e7609f7eff655dcee40
                                                                      • Instruction Fuzzy Hash: 8A3181B2B1874ACAEB109F61D8812BA33E5EB94B54F484139DA0ED32A0DF3CE548C744
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: FromProg$Initialize
                                                                      • String ID: MSXML.DOMDocument$Msxml2.DOMDocument$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\xmlutil.cpp$failed to get CLSID for XML DOM$failed to initialize COM
                                                                      • API String ID: 4047641309-3267221515
                                                                      • Opcode ID: dffb43baaddad9bc6bdb51b739d96642f4a3a695025360941462ed5dcd0f4e73
                                                                      • Instruction ID: f955c1d90168f2dfaf70e37a5f2f1da9f6846d630c615cd4b963f38a1f39df22
                                                                      • Opcode Fuzzy Hash: dffb43baaddad9bc6bdb51b739d96642f4a3a695025360941462ed5dcd0f4e73
                                                                      • Instruction Fuzzy Hash: 6611CBA0A1865F8AFB619B55E88427523E5AF54318F9C0036C80DE23A4EF7DF68D8714
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$Global$AllocFree
                                                                      • String ID: d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\fileutil.cpp$failed to allocate version info for file: %ls$failed to get version info for file: %ls$failed to get version value for file: %ls
                                                                      • API String ID: 1145190524-120110023
                                                                      • Opcode ID: 39d30e47cf5d98fbb08267685f51a69969a6f4ec8c60af5f2ef1cbb306806ffd
                                                                      • Instruction ID: eec4be0a5cb28de9419ca4455bb1cbcfea226ab3389365297bd78ca2f9f55d69
                                                                      • Opcode Fuzzy Hash: 39d30e47cf5d98fbb08267685f51a69969a6f4ec8c60af5f2ef1cbb306806ffd
                                                                      • Instruction Fuzzy Hash: E85180B1B18B4A86E7209F56E8801B9B3E4BB44BA0F5C413ADE4DE3751DF3CE5498718
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFileLast$PointerRead
                                                                      • String ID: Failed to move to virtual file pointer.$Failed to read during cabinet extraction.$d:\a\wix4\wix4\src\burn\engine\cabextract.cpp
                                                                      • API String ID: 2170121939-693781326
                                                                      • Opcode ID: 0ed86816ffb5f291a339978eed2719b9eb369ea735997d4a2ce8bf672f78d7e3
                                                                      • Instruction ID: 55e00c5444bfb16290ee9499e37b4dab0279662530d86aafb0f40a66e5a37e2d
                                                                      • Opcode Fuzzy Hash: 0ed86816ffb5f291a339978eed2719b9eb369ea735997d4a2ce8bf672f78d7e3
                                                                      • Instruction Fuzzy Hash: 0B41A872B18A4586F7219F26F84066A67E4FB98B90F480139DE8ED7764DF3CE145C700
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Both paths are required.$Failed to canonicalize wzPath1.$Failed to canonicalize wzPath2.$Failed to compare canonicalized paths.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\path2utl.cpp
                                                                      • API String ID: 0-2188151180
                                                                      • Opcode ID: fede792173ae96eece8cb60ed36197cea2215e18a9e17279548623fb713c1418
                                                                      • Instruction ID: 0f713f88174127679e858efac0c46a8c82abf61a3128e66d50b102de7c2eb7b2
                                                                      • Opcode Fuzzy Hash: fede792173ae96eece8cb60ed36197cea2215e18a9e17279548623fb713c1418
                                                                      • Instruction Fuzzy Hash: A731E4A1B1874A86FB20CB55E8503BA27E0EF88794F884135D90DE3795DF3CE908C744
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: %ls%ls$Failed to create the fully-qualified path to %ls.$Failed to get the Windows system directory.$Failed to load the library %ls.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\apputil.cpp
                                                                      • API String ID: 0-242608188
                                                                      • Opcode ID: 67ef53d6fb76c82031dae7dc45e5c0847792aa4b6c13489baefde53258fd5f2a
                                                                      • Instruction ID: 8c3b6acf68b34725b58cdcef131bbb4075569e8cfb15ebb8a36d62affb858dc0
                                                                      • Opcode Fuzzy Hash: 67ef53d6fb76c82031dae7dc45e5c0847792aa4b6c13489baefde53258fd5f2a
                                                                      • Instruction Fuzzy Hash: B7317FB2B18B4682E7108B15E48036977E4FF84B90F58013ADA8DD77A5EF3CE559CB44
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ArgvCommandErrorLastLine
                                                                      • String ID: Failed to copy command line.$Failed to initialize command line.$Failed to parse command line.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\app2util.cpp$ignored
                                                                      • API String ID: 3459693003-1494111247
                                                                      • Opcode ID: 9d40f0f7c73836f8c8e5373fdfa9186b3953c36ccd197477d62e72ff3c91e7d9
                                                                      • Instruction ID: ff873414491af72941cea643e5376dac72ad12083af3e9a78a27e5459dac8cda
                                                                      • Opcode Fuzzy Hash: 9d40f0f7c73836f8c8e5373fdfa9186b3953c36ccd197477d62e72ff3c91e7d9
                                                                      • Instruction Fuzzy Hash: AA316BA2B18B4AC6EB10DF15E88076A77E1FB84780F484136DA4DE3B95DE3CE509C704
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CloseCreateFileHandle
                                                                      • String ID: -%ls=%Iu$Failed to append the file handle to the command line.$Failed to append the file handle to the obfuscated command line.$burn.filehandle.self$d:\a\wix4\wix4\src\burn\engine\core.cpp
                                                                      • API String ID: 3498533004-2018830601
                                                                      • Opcode ID: 2c5df6709ce8b56ce8360d0c2c22f3e1b031a008ac5ae8c2b80303a8fdf89c6d
                                                                      • Instruction ID: 0e05ff87761280b14f5adb6b0c3a058321d07c1536c2ceecd3a92a373c11ca77
                                                                      • Opcode Fuzzy Hash: 2c5df6709ce8b56ce8360d0c2c22f3e1b031a008ac5ae8c2b80303a8fdf89c6d
                                                                      • Instruction Fuzzy Hash: 33319C72B18B4A85EB108B11D8445A933E4BB487B4F584331D97CE77D0DF7DE55A8700
                                                                      APIs
                                                                      • lstrlenW.KERNEL32(?,?,?,?,PackageCache,WiX\Burn,?,?,?,00007FF6570EA998), ref: 00007FF6570EAF16
                                                                        • Part of subcall function 00007FF657086A48: GetProcessHeap.KERNEL32(?,?,00000000,00007FF657086EA4), ref: 00007FF657086A51
                                                                        • Part of subcall function 00007FF657086A48: RtlFreeHeap.NTDLL(?,?,00000000,00007FF657086EA4), ref: 00007FF657086A5F
                                                                        • Part of subcall function 00007FF657086A48: GetLastError.KERNEL32(?,?,00000000,00007FF657086EA4), ref: 00007FF657086A6B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$ErrorFreeLastProcesslstrlen
                                                                      • String ID: Failed to allocate buffer for raw registry value.$Failed to expand registry value: %ls$Failed to get size of raw registry value.$Failed to read raw registry value.$PackageCache$WiX\Burn$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\regutil.cpp
                                                                      • API String ID: 1805815496-2559918165
                                                                      • Opcode ID: 8c19b1b00cf8b08b12845aebfda0f427108407bbfc06537a5cf743504ee2fd50
                                                                      • Instruction ID: 9737de57000e3d0a1ff689631b7504575d8c14e4704514839d040b3dabadbdce
                                                                      • Opcode Fuzzy Hash: 8c19b1b00cf8b08b12845aebfda0f427108407bbfc06537a5cf743504ee2fd50
                                                                      • Instruction Fuzzy Hash: 5851ADF1B09B5B85EB209B52A48027A32E1EF89B94F588136DE4DE7751DF3DE449C300
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast
                                                                      • String ID: Failed to allocate space for expanded path.$Failed to expand environment variables in string: %ls$Failed to get max length of input buffer.$Failed to get max length of written input buffer.$Failed to re-allocate more space for expanded path.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\env2util.cpp
                                                                      • API String ID: 1452528299-33012345
                                                                      • Opcode ID: 0013e021e670484a279ca5946d82639de24c974ab2ea8a11bc299b73e1ce5e5c
                                                                      • Instruction ID: ee767a54c2f04caa26d2ceacca28bd0540bc0c36f7eabea97100ba9bb6c2e15b
                                                                      • Opcode Fuzzy Hash: 0013e021e670484a279ca5946d82639de24c974ab2ea8a11bc299b73e1ce5e5c
                                                                      • Instruction Fuzzy Hash: 7651B3A5B0874A82EB20DF16D98057A63E4BF44790F1C4235DE0DE3791EF3DE9199308
                                                                      APIs
                                                                      • VariantInit.OLEAUT32 ref: 00007FF6570EEF13
                                                                        • Part of subcall function 00007FF6570EE4B8: GetModuleHandleA.KERNEL32(?,?,?,?,?,00000000,?,00007FF6570EEF27), ref: 00007FF6570EE4F7
                                                                        • Part of subcall function 00007FF6570EE4B8: GetLastError.KERNEL32(?,?,?,?,?,00000000,?,00007FF6570EEF27), ref: 00007FF6570EE509
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorHandleInitLastModuleVariant
                                                                      • String ID: d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\xmlutil.cpp$failed XmlCreateDocument$failed loadXML$failed put_resolveExternals$failed put_validateOnParse
                                                                      • API String ID: 52713655-3681987369
                                                                      • Opcode ID: 1f3dcb7df1545f6f33462148bd07c74ca6560f1befc8b4b5d3bd1dbd089af84f
                                                                      • Instruction ID: ae8a1917aaf6e4b97793c859ae06001fdce7784125a6325025a484e6aaee6ed1
                                                                      • Opcode Fuzzy Hash: 1f3dcb7df1545f6f33462148bd07c74ca6560f1befc8b4b5d3bd1dbd089af84f
                                                                      • Instruction Fuzzy Hash: CF518E72B04A4A96EB11CF65D8406ED33A1FB88B98F894031CE0DE7768DF39E55AC344
                                                                      APIs
                                                                      • GetLastError.KERNEL32(?,?,?,00007FF6570DA7F5,?,?,?,?,00007FF657086E74), ref: 00007FF6570DE2C7
                                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF6570DA7F5,?,?,?,?,00007FF657086E74), ref: 00007FF6570DE2FD
                                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF6570DA7F5,?,?,?,?,00007FF657086E74), ref: 00007FF6570DE32A
                                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF6570DA7F5,?,?,?,?,00007FF657086E74), ref: 00007FF6570DE33B
                                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF6570DA7F5,?,?,?,?,00007FF657086E74), ref: 00007FF6570DE34C
                                                                      • SetLastError.KERNEL32(?,?,?,00007FF6570DA7F5,?,?,?,?,00007FF657086E74), ref: 00007FF6570DE367
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Value$ErrorLast
                                                                      • String ID:
                                                                      • API String ID: 2506987500-0
                                                                      • Opcode ID: 6262d057a812f5c2f928db953ebc8865f7822feda257fda2b0ccab29179fa8de
                                                                      • Instruction ID: c2f51f41744297a3092d5a2f18c40ba6fb00c60eac67aa67cef14ea013f407f5
                                                                      • Opcode Fuzzy Hash: 6262d057a812f5c2f928db953ebc8865f7822feda257fda2b0ccab29179fa8de
                                                                      • Instruction Fuzzy Hash: 65116DA0E0C34B42FB68AB31954513E61D26F84BB4F5C0734E82EE66D6DE7CB44A4208
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFileLastPointer
                                                                      • String ID: Failed to move file pointer 0x%x bytes.$Invalid seek type.$d:\a\wix4\wix4\src\burn\engine\cabextract.cpp
                                                                      • API String ID: 2976181284-2861879377
                                                                      • Opcode ID: b25aeacc7a5ecf52bfd3d6918e6d373c1f59895f061c1cfa0569b1339377962d
                                                                      • Instruction ID: 2cb201ae974c9b903a7539950b9e968a2e15858b368541ae4fd98546183eb101
                                                                      • Opcode Fuzzy Hash: b25aeacc7a5ecf52bfd3d6918e6d373c1f59895f061c1cfa0569b1339377962d
                                                                      • Instruction Fuzzy Hash: C541F6B2B18A4986EB208F15E450A6DB3E4FF84B94F084136DA8DE7B54CF3CEA45C700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFileLast$ReadWrite
                                                                      • String ID: Failed to read from source.$Failed to write to target.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\fileutil.cpp
                                                                      • API String ID: 277903624-3357669501
                                                                      • Opcode ID: c3623f6dce8561f4e16c1ea28ea20801cc825525acd0a3b2ccc0281a51f03d9c
                                                                      • Instruction ID: 97f3991245287aebb10b8238a6ddee78ed4beffd7011edd29743ac83855673ab
                                                                      • Opcode Fuzzy Hash: c3623f6dce8561f4e16c1ea28ea20801cc825525acd0a3b2ccc0281a51f03d9c
                                                                      • Instruction Fuzzy Hash: 7C31D662B2878687E7208B26A8407A662D4BB847D4F4C0035EE4DD7744EE7CE5498B04
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CreateErrorLastProcess
                                                                      • String ID: CreateProcessW failed with return code: %d$d:\a\wix4\wix4\src\burn\engine\core.cpp$h
                                                                      • API String ID: 2919029540-2795142421
                                                                      • Opcode ID: 63136635b7cc7fff6d37b532b63b2002f07edd3706672013ec74a1decf7ef047
                                                                      • Instruction ID: 1b34c570095d6b91cb9bc34f47e76f9f62039eebc7304930e641c679f6d902b9
                                                                      • Opcode Fuzzy Hash: 63136635b7cc7fff6d37b532b63b2002f07edd3706672013ec74a1decf7ef047
                                                                      • Instruction Fuzzy Hash: B731AFB6B18B9486D7608F12E84075AB3E5FB98B90F484136DA8CD3B54CF3CD954CB00
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Close
                                                                      • String ID: Failed to combine logging path with root path.$Failed to open policy registry key.$SOFTWARE\Policies\$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\polcutil.cpp
                                                                      • API String ID: 3535843008-3658365009
                                                                      • Opcode ID: f7273862b057bd86da3c46715ec3fe7e3719a310ee2464a2ca2d4ba82921e5ab
                                                                      • Instruction ID: c08efc2de4a4fe11a0c28d6ad1518e0092f9f1908cc3d6dc0b20a3c5ade9e7a2
                                                                      • Opcode Fuzzy Hash: f7273862b057bd86da3c46715ec3fe7e3719a310ee2464a2ca2d4ba82921e5ab
                                                                      • Instruction Fuzzy Hash: 1921E4A1B0CB4BC2FB108F92E89037A6394AF447A0F4C4639DA1DE3795DF6CE4098704
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CodeErrorExitLastObjectProcessSingleWait
                                                                      • String ID: Failed to get process return code.$Failed to wait for process to complete.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\procutil.cpp
                                                                      • API String ID: 1402617016-1146304469
                                                                      • Opcode ID: b58a270557d855a03ee4fa10c8ab8fbd562e98b6f65b554e0cebba0a7ff55790
                                                                      • Instruction ID: abbdd1e4a1340cecd31cb9e28912c5c9e601767660b65795856c770ad4c20bf7
                                                                      • Opcode Fuzzy Hash: b58a270557d855a03ee4fa10c8ab8fbd562e98b6f65b554e0cebba0a7ff55790
                                                                      • Instruction Fuzzy Hash: 491193A0F1874A86FF108F66E98027662D1AF44B90F5C0135DE4CE3764DE2CD949C705
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CreateFromStringUuid
                                                                      • String ID: Failed to convert guid into string.$UuidCreate failed.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\guidutil.cpp
                                                                      • API String ID: 4041566446-2208176607
                                                                      • Opcode ID: cd3b1b1c901f0fd644786a3a336bff44b11559b46f2e1844788a9fd255fd8d48
                                                                      • Instruction ID: ad35c585a10ce01ce0d1bf828f8daf74a8d25864774b7b4cfbc1c461edadf5e7
                                                                      • Opcode Fuzzy Hash: cd3b1b1c901f0fd644786a3a336bff44b11559b46f2e1844788a9fd255fd8d48
                                                                      • Instruction Fuzzy Hash: 11116071B18B4986EB208F12E8801B973E5BB89B90F480135DA5DE7754EF3DE609CB44
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Close
                                                                      • String ID: Failed to open policy key: %ls$Failed to open policy key: %ls, name: %ls$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\polcutil.cpp
                                                                      • API String ID: 3535843008-3938230626
                                                                      • Opcode ID: 7b1ebd2ef746dce9c00f325ad910bad3deac876e2e27e991bf2dfa9a74b80cfa
                                                                      • Instruction ID: 51b35da3da521804de593ab5d95ea71d9de8361c052482cb366df5c468f1cd91
                                                                      • Opcode Fuzzy Hash: 7b1ebd2ef746dce9c00f325ad910bad3deac876e2e27e991bf2dfa9a74b80cfa
                                                                      • Instruction Fuzzy Hash: 7941A0B261874A86EB209F52D4806B973E4FB84B80F584235EF4DE3B51CF3CE5998744
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Close
                                                                      • String ID: Failed to open policy key: %ls$Failed to open policy key: %ls, name: %ls$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\polcutil.cpp
                                                                      • API String ID: 3535843008-3938230626
                                                                      • Opcode ID: 87bb9714ae569741a161d9f99453a3141c6ece71bdde9f44eee302eefaf74637
                                                                      • Instruction ID: 34c4e8af09b6eb44c3aa0bf067c0a98115f5e7d8b052c457666f540b7381dd4b
                                                                      • Opcode Fuzzy Hash: 87bb9714ae569741a161d9f99453a3141c6ece71bdde9f44eee302eefaf74637
                                                                      • Instruction Fuzzy Hash: C9319EB271974A86EB219F51E4806B973A0FF84B90F5C8235DA4DE3B50DF3CE9598B04
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFileLastWrite
                                                                      • String ID: Failed to write data to file handle.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\fileutil.cpp
                                                                      • API String ID: 442123175-1082378667
                                                                      • Opcode ID: d407306c0fdceb1b3a9534ce4aa4d1dbd145b762a14b25958bfaf9da883fd8e2
                                                                      • Instruction ID: f933c8deae2897ce9b25985878e277dd02494f5866507c3723add79c2bb25d03
                                                                      • Opcode Fuzzy Hash: d407306c0fdceb1b3a9534ce4aa4d1dbd145b762a14b25958bfaf9da883fd8e2
                                                                      • Instruction Fuzzy Hash: 5221CF72B08B9982E7208F5AE840269A7E0FB84BB0F494235DE4CD7754DF3CE549CB04
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFileLastPointer
                                                                      • String ID: Failed to set file pointer.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\fileutil.cpp
                                                                      • API String ID: 2976181284-4026511950
                                                                      • Opcode ID: 9c56ff33643dbda1b4ee31b5768f95f131e0a70ca5b467b0d3bb42afc0c88646
                                                                      • Instruction ID: 2f9cef49d8027760f46b999568d5b27c510db94543ec447119db99ddf75cdfab
                                                                      • Opcode Fuzzy Hash: 9c56ff33643dbda1b4ee31b5768f95f131e0a70ca5b467b0d3bb42afc0c88646
                                                                      • Instruction Fuzzy Hash: A301B972B1C74586E7108B15E99057A73E0AF447A0F5C013ADE4ED3765DE3CD959C704
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_initialize_crt__scrt_release_startup_lock
                                                                      • String ID:
                                                                      • API String ID: 1452418845-0
                                                                      • Opcode ID: 27b8dab774c2d9bab2e773a9f7d5706ea40abbe41812c2071e251beafb35e4d2
                                                                      • Instruction ID: 1db41339cb3f2dffb0e0bd9aacb4861d1b89e558e2b30c8cad424411af98493e
                                                                      • Opcode Fuzzy Hash: 27b8dab774c2d9bab2e773a9f7d5706ea40abbe41812c2071e251beafb35e4d2
                                                                      • Instruction Fuzzy Hash: 853139A1E0D34F85FB64AB65A4653B962D1AF41744F4C4038E94EFB2D7DE2CA40DCB48
                                                                      APIs
                                                                      • RegOpenKeyExW.KERNELBASE(?,?,?,?,?,?,00000000,00007FF6570EA66D), ref: 00007FF6570EA6C1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Open
                                                                      • String ID: Failed to open registry key, root: %x, subkey: %ls.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\regutil.cpp
                                                                      • API String ID: 71445658-2584571730
                                                                      • Opcode ID: 965dfb476a08b0058f714feff75aa3df8aa7835b1a35abdcb0ef4915d9edd745
                                                                      • Instruction ID: c28143e53b337513101eb821bd4699b83e3bd78e6c1f45ec6dac8a6a29b10fde
                                                                      • Opcode Fuzzy Hash: 965dfb476a08b0058f714feff75aa3df8aa7835b1a35abdcb0ef4915d9edd745
                                                                      • Instruction Fuzzy Hash: 6E21F9B1B1875A82F7248716F88063A76D0FB88790F1C413AEE8DE3BA4DE3DD4458700
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Process$CurrentExitTerminate
                                                                      • String ID:
                                                                      • API String ID: 1703294689-0
                                                                      • Opcode ID: 118586e5da2c2c5df0f31c9d882adbc8871ef55a971431e94d8a96148af0b72d
                                                                      • Instruction ID: 51c183ab7b7d422c84504fa843daf40c833de094cdb51ba74d18785488085fa8
                                                                      • Opcode Fuzzy Hash: 118586e5da2c2c5df0f31c9d882adbc8871ef55a971431e94d8a96148af0b72d
                                                                      • Instruction Fuzzy Hash: 5ED092E8B0878E43EB58BB746C9A57812916F48B05F081438D80BE63A3DD6CB80D8308
                                                                      APIs
                                                                      • RegQueryValueExW.KERNELBASE(?,?,?,?,?,00000000,?,00007FF6570EADB9,?,?,?,?,PackageCache,WiX\Burn), ref: 00007FF6570E9B25
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: QueryValue
                                                                      • String ID:
                                                                      • API String ID: 3660427363-0
                                                                      • Opcode ID: a64a5ef4644afd26a39ffb46d3ae2a1aa7cbad339d34b15aea17090be9bbd9d2
                                                                      • Instruction ID: 32ce1dfa89fc441527d5868d666bef2c7b03f5b8ded580425bc7f69d4407f858
                                                                      • Opcode Fuzzy Hash: a64a5ef4644afd26a39ffb46d3ae2a1aa7cbad339d34b15aea17090be9bbd9d2
                                                                      • Instruction Fuzzy Hash: C531C172A08B4A82EB24CF19E58457AB2E5FBC8790F588135DE8DD3768DF3CD4458B00
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: HandleModule$AddressFreeLibraryProc
                                                                      • String ID:
                                                                      • API String ID: 3947729631-0
                                                                      • Opcode ID: 6256f53ca04e45a470767ab099876bb17516bf02e3579ecd857cdc2fa85d8ce6
                                                                      • Instruction ID: c235f1cfa2638bf5ffc03afbea0ce890dffe7dd1aae1a3edeccaa3ce7f1e4260
                                                                      • Opcode Fuzzy Hash: 6256f53ca04e45a470767ab099876bb17516bf02e3579ecd857cdc2fa85d8ce6
                                                                      • Instruction Fuzzy Hash: F3216D72F047498AEB24AFA4C4407ED33E0EB44B18F580639D61C96AD5DF7CD549CB88
                                                                      APIs
                                                                        • Part of subcall function 00007FF6570E7E94: CloseHandle.KERNELBASE(?,?,?,?,00007FF6570E8A3D,?,?,?,?,00007FF657089B13), ref: 00007FF6570E7EBD
                                                                      • DeleteCriticalSection.KERNEL32(?,?,?,?,00007FF657089B13), ref: 00007FF6570E8A4D
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CloseCriticalDeleteHandleSection
                                                                      • String ID:
                                                                      • API String ID: 1370521891-0
                                                                      • Opcode ID: 3972122421e57a6d6ed499a902b0d120fed6fd47b253657dadbc3f4465c40462
                                                                      • Instruction ID: 250c5a910c94bbd8c86cdc5d9fe97c4dfa1b8c4bd1dceeb053e4c1aa9fa37135
                                                                      • Opcode Fuzzy Hash: 3972122421e57a6d6ed499a902b0d120fed6fd47b253657dadbc3f4465c40462
                                                                      • Instruction Fuzzy Hash: 4B01F2A2E2EA0F8EFE68AB40E89433422A4BF54305F4D1679D81DF55E1CFBC78488240
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: __vcrt_uninitialize_ptd
                                                                      • String ID:
                                                                      • API String ID: 1180542099-0
                                                                      • Opcode ID: fe93c9f3dae6367e2934335e3a96940a33db470144273d8a97dc67f1954e6c33
                                                                      • Instruction ID: b3d1c17247f90485350872e18d5fd4bff84d5c820d2fb045f3b7f95f5b1343ac
                                                                      • Opcode Fuzzy Hash: fe93c9f3dae6367e2934335e3a96940a33db470144273d8a97dc67f1954e6c33
                                                                      • Instruction Fuzzy Hash: AFE0ECE0D1D30F82FF58BB3044860B812D06F15314FAC0A35D46EE21D2EEBC714E5659
                                                                      APIs
                                                                      • HeapAlloc.KERNEL32(?,?,00000000,00007FF6570DE31A,?,?,?,00007FF6570DA7F5,?,?,?,?,00007FF657086E74), ref: 00007FF6570DE8D9
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: AllocHeap
                                                                      • String ID:
                                                                      • API String ID: 4292702814-0
                                                                      • Opcode ID: 6816f070582a0aa4d523cefa68a651e2d594f7e8dc88d9f20504efd4beb997d1
                                                                      • Instruction ID: 4cb2627e8f36578c3db3eccd25cfab13c2f25128fb06bdddd08cf2ab573a30fb
                                                                      • Opcode Fuzzy Hash: 6816f070582a0aa4d523cefa68a651e2d594f7e8dc88d9f20504efd4beb997d1
                                                                      • Instruction Fuzzy Hash: 28F090D4F0978F81FF6567A199403B552D15F84B80F4C0430DD0EE63C2ED3CE5899228
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CloseHandle
                                                                      • String ID:
                                                                      • API String ID: 2962429428-0
                                                                      • Opcode ID: 65306c1bc02eaa31b320e4704995aa6286b217acbabccfd50aa651c1b362c6af
                                                                      • Instruction ID: 806001d25427fea1f7d80bf7bcc9f62c2b23cfb6f0c184320b49f6c91c1999d4
                                                                      • Opcode Fuzzy Hash: 65306c1bc02eaa31b320e4704995aa6286b217acbabccfd50aa651c1b362c6af
                                                                      • Instruction Fuzzy Hash: ACF044A1B15A4A82EB644F25D84172826E0FB5CB74F9D8331CA7DE33E0CE7CE5594700
                                                                      APIs
                                                                      • CloseHandle.KERNELBASE(?,?,?,?,00007FF6570E8A3D,?,?,?,?,00007FF657089B13), ref: 00007FF6570E7EBD
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CloseHandle
                                                                      • String ID:
                                                                      • API String ID: 2962429428-0
                                                                      • Opcode ID: 351051fcdfc542b78d82e75e9d4a8f3ed6b9744f615abb6132e3ae73b979003e
                                                                      • Instruction ID: 40f046dcd88b20dfe8d2143098cc4b97ca165c83a86e8aad5326282b85d77c61
                                                                      • Opcode Fuzzy Hash: 351051fcdfc542b78d82e75e9d4a8f3ed6b9744f615abb6132e3ae73b979003e
                                                                      • Instruction Fuzzy Hash: A5F0F4A1E0990F89FE69EB65A8903343290AF44774F5D1335E83DF6AE1CF7CA8894250
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CompareString$lstrlen
                                                                      • String ID: Clean room command-line switch must be first argument on command-line.$Failed to allocate the list of ancestors.$Failed to allocate the list of dependencies to ignore.$Failed to copy append log file path.$Failed to copy last used source.$Failed to copy log file path.$Failed to copy parent.$Failed to copy path for layout directory.$Failed to copy source process path.$Failed to ensure size for secret args.$Failed to ensure size for unknown args.$Failed to initialize parent to none.$Failed to parse elevated connection.$Failed to parse embedded connection.$Failed to parse file handle: '%ls'$Failed to parse splash screen window: '%ls'$Failed to store the custom working directory.$Invalid switch: %ls$Missing required parameter for switch: %ls$Multiple mode command-line switches were provided.$Must specify a path for append log.$Must specify a path for log.$Must specify a path for original source.$Must specify a value for parent.$Must specify the elevated name, token and parent process id.$Must specify the embedded name, token and parent process id.$W$burn.$burn.ancestors$burn.clean.room$burn.elevated$burn.embedded$burn.engine.working.directory$burn.filehandle.attached$burn.filehandle.self$burn.ignoredependencies$burn.log.append$burn.log.mode$burn.passthrough$burn.related.addon$burn.related.chain.package$burn.related.dependent.addon$burn.related.dependent.patch$burn.related.detect$burn.related.patch$burn.related.update$burn.related.upgrade$burn.runonce$burn.splash.screen$burn.system.component$d:\a\wix4\wix4\src\burn\engine\core.cpp$disablesystemrestore$help$keepaupaused$layout$log$modify$noaupause$originalsource$package$parent$parent:none$passive$quiet$repair$silent$uninstall$unsafeuninstall$update$xlog
                                                                      • API String ID: 1657112622-2303107143
                                                                      • Opcode ID: fc14395ed4ec41f42face3e38396021dc52055173c1501288e88ed037f15334a
                                                                      • Instruction ID: 8dd5bb84af7b1a9eee855fac9f0d63fc2f64ba01511e6193dd82fce35b2b4383
                                                                      • Opcode Fuzzy Hash: fc14395ed4ec41f42face3e38396021dc52055173c1501288e88ed037f15334a
                                                                      • Instruction Fuzzy Hash: C1D2A1B2E08A4A86EB309F15E8406BA33E5FB98754F59023AD54DE77A4DF3CE548C704
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: String$Compare$Free$Variant$ClearHeapInitProcess
                                                                      • String ID: ComponentId$Condition$DirectorySearch$DirectorySearch|FileSearch|RegistrySearch|MsiComponentSearch|MsiProductSearch|MsiFeatureSearch|ExtensionSearch|SetVariable$DisableFileRedirection$ExpandEnvironment$ExtensionId$ExtensionSearch$Failed to allocate memory for search structs.$Failed to find extension '%ls' for search '%ls'$Failed to get @ComponentId.$Failed to get @Condition.$Failed to get @ExpandEnvironment.$Failed to get @ExtensionId.$Failed to get @Id.$Failed to get @Path.$Failed to get @ProductCode or @UpgradeCode.$Failed to get @ProductCode.$Failed to get @Root.$Failed to get @Type.$Failed to get @UpgradeCode.$Failed to get @Value.$Failed to get @Variable.$Failed to get @VariableType.$Failed to get DisableFileRedirection attribute.$Failed to get Key attribute.$Failed to get Value attribute.$Failed to get Win64 attribute.$Failed to get next node.$Failed to get search node count.$Failed to select search nodes.$FileSearch$HKCR$HKCU$HKLM$HKU$Invalid value for @Root: %ls$Invalid value for @Type: %ls$Invalid value for @VariableType: %ls$Key$MsiComponentSearch$MsiProductSearch$Path$ProductCode$RegistrySearch$Root$SetVariable$Type$Unexpected element name: %ls$UpgradeCode$Value$Variable$VariableType$Win64$assignment$d:\a\wix4\wix4\src\burn\engine\search.cpp$directory$exists$formatted$keyPath$language$numeric$path$state$string$value$version
                                                                      • API String ID: 1017089093-2296787432
                                                                      • Opcode ID: 3dc0c97224cfa6b013c6ae1c2adfff102b22e6d3ed1add2691bcae90f4445704
                                                                      • Instruction ID: 91f7d5a73824cdcd45d76043f06ca19f0947649ccd5eec3e4a262b543914362e
                                                                      • Opcode Fuzzy Hash: 3dc0c97224cfa6b013c6ae1c2adfff102b22e6d3ed1add2691bcae90f4445704
                                                                      • Instruction Fuzzy Hash: 52B28FB1B08A4B96EB208F62D8805AD27E0FB58758F58013ADA0DF76A4DF7CE558C344
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: StringVariant$AllocClearFreeInit
                                                                      • String ID: AboutUrl$Arp$Classification$Comments$Contact$Department$DisableModify$DisableRemove$DisplayName$DisplayVersion$ExecutableName$Failed to get @AboutUrl.$Failed to get @Classification.$Failed to get @Comments.$Failed to get @Contact.$Failed to get @Department.$Failed to get @DisableModify.$Failed to get @DisableRemove.$Failed to get @DisplayName.$Failed to get @DisplayVersion.$Failed to get @ExecutableName.$Failed to get @HelpLink.$Failed to get @HelpTelephone.$Failed to get @Id.$Failed to get @InProgressDisplayName.$Failed to get @Manufacturer.$Failed to get @Name.$Failed to get @ParentDisplayName.$Failed to get @PerMachine.$Failed to get @ProductFamily.$Failed to get @ProviderKey.$Failed to get @Publisher.$Failed to get @Tag.$Failed to get @UpdateUrl.$Failed to get @Version.$Failed to parse @Version: %ls$Failed to parse related bundles$Failed to parse software tag.$Failed to select ARP node.$Failed to select Update node.$Failed to select registration node.$Failed to set registration paths.$HelpLink$HelpTelephone$InProgressDisplayName$Invalid modify disabled type: %ls$Manufacturer$Name$ParentDisplayName$PerMachine$ProductFamily$ProviderKey$Publisher$Registration$Tag$Update$UpdateUrl$Version$button$d:\a\wix4\wix4\src\burn\engine\registration.cpp$yes
                                                                      • API String ID: 760788290-4015652564
                                                                      • Opcode ID: 1170f1058f20d4f206ea7fa92fd00be57f01d0b6b6755a7fd3302ca0ccbf4cef
                                                                      • Instruction ID: e3c139268c69f0b9743e154025f6e5babb89c886fe72c8caeb69b610dabd3e5e
                                                                      • Opcode Fuzzy Hash: 1170f1058f20d4f206ea7fa92fd00be57f01d0b6b6755a7fd3302ca0ccbf4cef
                                                                      • Instruction Fuzzy Hash: 40626BA1F0860B96FB249B75C4902BA63A1BF64354F9C0436DA0EE76A1DF7CE95DC340
                                                                      APIs
                                                                      • CloseHandle.KERNEL32 ref: 00007FF6570B9F27
                                                                        • Part of subcall function 00007FF6570B9224: RegCloseKey.ADVAPI32(?,?,00000000,?,?,?,?,00007FF6570B9567), ref: 00007FF6570B9392
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Close$Handle
                                                                      • String ID: %ls$ -%ls$ -%ls=%ls$ -%ls=ALL$ -disablesystemrestore$ -quiet$"%ls"$%ls %ls$-repair$-uninstall$Failed to allocate base command.$Failed to allocate obfuscated bundle command.$Failed to append %ls$Failed to append argument from ARP.$Failed to append disable system restore.$Failed to append operation argument.$Failed to append quiet argument.$Failed to append relation type argument.$Failed to append the custom working directory to the bundlepackage command line.$Failed to append the list of ancestors to the command line.$Failed to append the list of dependencies to ignore to the command line.$Failed to append the parent switch to the command line.$Failed to append the parent to the command line.$Failed to build executable path.$Failed to copy executable path.$Failed to copy package arguments.$Failed to evaluate bundle package command-line condition.$Failed to format argument string.$Failed to format obfuscated argument string.$Failed to get cached path for package: %ls$Failed to get cached path for related bundle: %ls$Failed to get command-line argument for install.$Failed to get command-line argument for repair.$Failed to get command-line argument for uninstall.$Failed to get parent directory for QuietUninstallString executable path: %ls$Failed to parse QuietUninstallString: %ls.$Failed to query ARP for uninstall.$Failed to run BUNDLE process$Failed to run bundle as embedded from path: %ls$Failed to separate command-line arguments.$Failed to verify the QuietUninstallString executable path is in a secure location: %ls$Invalid Bundle package action: %d.$Process returned error: 0x%x$QuietUninstallString is null.$QuietUninstallString must contain an executable path.$Related bundles must have a fully qualified target path.$The QuietUninstallString executable path is not in a secure location: %ls$The only supported action when the cache is not available is UNINSTALL.$WixBundleExecutePackageAction$WixBundleExecutePackageCacheFolder$burn.ancestors$burn.filehandle.self$burn.ignoredependencies$burn.system.component$d:\a\wix4\wix4\src\burn\engine\bundlepackageengine.cpp$parent
                                                                      • API String ID: 187904097-2509892201
                                                                      • Opcode ID: 43d4a0b7ae3e3ab29b15711caacff0180075177611a256c967ea91f13d3bb872
                                                                      • Instruction ID: a3ebf3d7c8d305c4611d29b1095ac2aa8094d3b1237e6b977b512ca730d9593a
                                                                      • Opcode Fuzzy Hash: 43d4a0b7ae3e3ab29b15711caacff0180075177611a256c967ea91f13d3bb872
                                                                      • Instruction Fuzzy Hash: EB728EA2B1CA4BC6EF208B65D4542BE63E5EB84394F580136DA4DE7799DF3CF6098700
                                                                      APIs
                                                                        • Part of subcall function 00007FF6570EE988: VariantInit.OLEAUT32 ref: 00007FF6570EE9B6
                                                                        • Part of subcall function 00007FF6570EE988: VariantClear.OLEAUT32 ref: 00007FF6570EEB19
                                                                        • Part of subcall function 00007FF6570EE988: SysFreeString.OLEAUT32 ref: 00007FF6570EEB27
                                                                      • CompareStringW.KERNEL32(?,?,?,?,?,?,?,00007FF6570991FF), ref: 00007FF6570924D2
                                                                      • CompareStringW.KERNEL32(?,?,?,?,?,?,?,00007FF6570991FF), ref: 00007FF6570924FE
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: String$CompareVariant$ClearFreeInit
                                                                      • String ID: @Container is required for embedded payload.$CertificateRootPublicKeyIdentifier$CertificateRootThumbprint$Container$DownloadUrl$Failed to add payload to container dictionary.$Failed to add payload to payloads dictionary.$Failed to allocate memory for layout payloads.$Failed to allocate memory for payload structs.$Failed to create dictionary for container payloads.$Failed to create dictionary for payloads.$Failed to find container: %ls$Failed to get @CertificateRootPublicKeyIdentifier.$Failed to get @CertificateRootThumbprint.$Failed to get @Container.$Failed to get @DownloadUrl.$Failed to get @FilePath.$Failed to get @FileSize.$Failed to get @Hash.$Failed to get @Id.$Failed to get @LayoutOnly.$Failed to get @Packaging.$Failed to get @SourcePath.$Failed to get next node.$Failed to get payload node count.$Failed to hex decode @CertificateRootPublicKeyIdentifier.$Failed to hex decode @CertificateRootThumbprint.$Failed to hex decode the Payload/@Hash.$Failed to parse @FileSize.$Failed to select payload nodes.$File size is required when verifying by hash for payload: %ls$FilePath$FileSize$Hash$Invalid value for @Packaging: %ls$LayoutOnly$Packaging$Payload$SourcePath$There was no verification information for payload: %ls$d:\a\wix4\wix4\src\burn\engine\payload.cpp$embedded$external
                                                                      • API String ID: 1311288327-2408702627
                                                                      • Opcode ID: 5fa59fbc48b2a1792706025eff86d56aed105aeda486125f440f35ba33919bd0
                                                                      • Instruction ID: 674ccb28b544078dae6e1414f735d151dde877addd2d1af05f67591dbc9d2c64
                                                                      • Opcode Fuzzy Hash: 5fa59fbc48b2a1792706025eff86d56aed105aeda486125f440f35ba33919bd0
                                                                      • Instruction Fuzzy Hash: 60426BA1B18B1BC6FB20CF66D480AB927E4AB58754F884036DA0DF77A5DE3CE549C740
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: FreeString
                                                                      • String ID: Cannot have two content elements in ATOM entry.$Failed to allocate ATOM entry authors.$Failed to allocate ATOM entry categories.$Failed to allocate ATOM entry content.$Failed to allocate ATOM entry id.$Failed to allocate ATOM entry links.$Failed to allocate ATOM entry published.$Failed to allocate ATOM entry summary.$Failed to allocate ATOM entry title.$Failed to allocate ATOM entry updated.$Failed to find required feed/entry/id element.$Failed to find required feed/entry/title element.$Failed to find required feed/entry/updated element.$Failed to get child nodes of ATOM entry element.$Failed to parse ATOM entry author.$Failed to parse ATOM entry category.$Failed to parse ATOM entry content.$Failed to parse ATOM entry link.$Failed to parse unknown ATOM entry element: %ls$Failed to process all ATOM entry elements.$author$category$content$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\atomutil.cpp$link$published$summary$title$updated
                                                                      • API String ID: 3341692771-2592745375
                                                                      • Opcode ID: 6a0daaf6130e23b9235925afa567c147a560c7eba3eeb6340082e00d1bccd2b1
                                                                      • Instruction ID: 53cffad1a6729bbf2c2783b5ac741921090fce6589aac0a011e94b758a9715d9
                                                                      • Opcode Fuzzy Hash: 6a0daaf6130e23b9235925afa567c147a560c7eba3eeb6340082e00d1bccd2b1
                                                                      • Instruction Fuzzy Hash: FB1274F1A08B5A86EB20CF16D88016977E4FB49794F680136D68DE3B64DF3CE549C748
                                                                      APIs
                                                                      • CompareStringW.KERNEL32(?,?,00000000,?,?,00000000,00000000,00007FF6570FCA6D,?,?,?,?,?,00007FF6570C9690), ref: 00007FF6570FC3BD
                                                                      • CompareStringW.KERNEL32(?,?,00000000,?,?,00000000,00000000,00007FF6570FCA6D,?,?,?,?,?,00007FF6570C9690), ref: 00007FF6570FC3E9
                                                                      • CompareStringW.KERNEL32(?,?,00000000,?,?,00000000,00000000,00007FF6570FCA6D,?,?,?,?,?,00007FF6570C9690), ref: 00007FF6570FC434
                                                                      • CompareStringW.KERNEL32(?,?,00000000,?,?,00000000,00000000,00007FF6570FCA6D,?,?,?,?,?,00007FF6570C9690), ref: 00007FF6570FC4B5
                                                                      • CompareStringW.KERNEL32(?,?,00000000,?,?,00000000,00000000,00007FF6570FCA6D,?,?,?,?,?,00007FF6570C9690), ref: 00007FF6570FC504
                                                                      • CompareStringW.KERNEL32(?,?,00000000,?,?,00000000,00000000,00007FF6570FCA6D,?,?,?,?,?,00007FF6570C9690), ref: 00007FF6570FC581
                                                                      • CompareStringW.KERNEL32(?,?,00000000,?,?,00000000,00000000,00007FF6570FCA6D,?,?,?,?,?,00007FF6570C9690), ref: 00007FF6570FC5A9
                                                                      • CompareStringW.KERNEL32(?,?,00000000,?,?,00000000,00000000,00007FF6570FCA6D,?,?,?,?,?,00007FF6570C9690), ref: 00007FF6570FC5E3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CompareString
                                                                      • String ID: Failed to allocate application identity.$Failed to allocate application summary.$Failed to allocate application title.$Failed to allocate application type.$Failed to allocate content type.$Failed to allocate content.$Failed to allocate enclosures for application update entry.$Failed to allocate upgrade id.$Failed to compare version to upgrade version.$Failed to parse enclosure.$Failed to parse upgrade version string '%ls' from ATOM entry.$Failed to parse version string '%ls' from ATOM entry.$Upgrade version is greater than or equal to application version.$application$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\apuputil.cpp$enclosure$exclusive$http://appsyndication.org/2006/appsyn$true$type$upgrade$version
                                                                      • API String ID: 1825529933-937056351
                                                                      • Opcode ID: 23ea699e5599f4fe506c16e70333afe659531e457d8e6be03ae07f3ab97b0e9d
                                                                      • Instruction ID: 25e8654729592a3bc79509a274f0c51a3c3e2d734cd7d874889b39ca03a1083e
                                                                      • Opcode Fuzzy Hash: 23ea699e5599f4fe506c16e70333afe659531e457d8e6be03ae07f3ab97b0e9d
                                                                      • Instruction Fuzzy Hash: CAF1A3B1B18A4A86EB20DB16D4416BA33E1FF58BA4F484032DA0DE7A54DF3CE55DC748
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CompareString
                                                                      • String ID: BA aborted detect MSI feature.$BA aborted detect compatible MSI package.$BA aborted detect related MSI package.$Failed to compare related installed version '%ls' to related max version: '%ls'$Failed to compare related installed version '%ls' to related min version: '%ls'$Failed to compare version '%ls' to dependency version: '%ls'$Failed to compare version '%ls' to installed version: '%ls'$Failed to detect compatible package for MSI package.$Failed to detect dependencies for MSI package.$Failed to enum related products.$Failed to get product information for ProductCode: %ls$Failed to get version for product in machine context: %ls$Failed to get version for product in user unmanaged context: %ls$Failed to parse dependency version: '%ls' for ProductCode: %ls$Failed to parse installed version: '%ls' for ProductCode: %ls$Failed to parse related installed version: '%ls' for ProductCode: %ls$Failed to query feature state.$Invalid state value.$Language$VersionString$d:\a\wix4\wix4\src\burn\engine\msiengine.cpp
                                                                      • API String ID: 1825529933-4240161938
                                                                      • Opcode ID: 0123d77c6365f2c4257f757a9fc96eb2d8538189ded58550cc1b67182254bd5d
                                                                      • Instruction ID: 0f5aab53eb42a6a8018bef2fadb1d7dd3d5530cae4b5d3ca40da9756d5afbe97
                                                                      • Opcode Fuzzy Hash: 0123d77c6365f2c4257f757a9fc96eb2d8538189ded58550cc1b67182254bd5d
                                                                      • Instruction Fuzzy Hash: 77526BB2B08A4A9AEB64CB65D0503AD33E1FB48748F580136DA4DE7B95DF3CF6198740
                                                                      APIs
                                                                        • Part of subcall function 00007FF657086828: GetProcessHeap.KERNEL32(?,?,00000000,00007FF657082158,?,?,?,?,?,?,00000000,00007FF657081F49,?,?,?,00000000), ref: 00007FF65708683C
                                                                      • CreateEventW.KERNEL32(?,?,?,?,?,?,00000000,00007FF6570D37B5), ref: 00007FF6570D2EE6
                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,00007FF6570D37B5), ref: 00007FF6570D2EF5
                                                                      • ReleaseMutex.KERNEL32 ref: 00007FF6570D3226
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CreateErrorEventHeapLastMutexProcessRelease
                                                                      • String ID: %ls_mutex$%ls_send$Failed to MapViewOfFile for %ls.$Failed to allocate memory for NetFxChainer struct.$Failed to create event: %ls$Failed to create mutex: %ls$Failed to memory map cabinet file: %ls$d:\a\wix4\wix4\src\burn\engine\netfxchainer.cpp$failed to allocate memory for event name$failed to allocate memory for mutex name$failed to copy event name to shared memory structure.
                                                                      • API String ID: 2541623014-3435579092
                                                                      • Opcode ID: 76613ab1a2616fd746ed7da0be1fbb8cee82fcc707d4b14d28461955692d2df9
                                                                      • Instruction ID: 859baaa34c462927cc13fee8c5e2c985847847b27ce90cd719b90dbcc951cf1c
                                                                      • Opcode Fuzzy Hash: 76613ab1a2616fd746ed7da0be1fbb8cee82fcc707d4b14d28461955692d2df9
                                                                      • Instruction Fuzzy Hash: 44B1BFB1B08B5AC6EB10CB65D48076927E4FB58B90F484539DE4DD3BA0EF3CE4198748
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$CloseCreateFreeHandleLocalNamedPipe
                                                                      • String ID: D:(A;;GA;;;SY)(A;;GA;;;BA)(A;;GRGW0x00100000;;;WD)$Failed to allocate full name of cache pipe: %ls$Failed to allocate full name of logging pipe: %ls$Failed to allocate full name of pipe: %ls$Failed to create cache pipe: %ls$Failed to create logging pipe: %ls$Failed to create pipe: %ls$Failed to create the security descriptor for the connection event and pipe.$\\.\pipe\%ls$\\.\pipe\%ls.Cache$\\.\pipe\%ls.Log$d:\a\wix4\wix4\src\burn\engine\pipe.cpp
                                                                      • API String ID: 1815745246-2819417629
                                                                      • Opcode ID: 567f2d78391e832f954883df963d1b3695d9fe8fd18bacc2e23b07cc27e715f0
                                                                      • Instruction ID: 1ae13b921e229ff1f5d73818660f1d455e3689742afef4a51e2661b1a942836c
                                                                      • Opcode Fuzzy Hash: 567f2d78391e832f954883df963d1b3695d9fe8fd18bacc2e23b07cc27e715f0
                                                                      • Instruction Fuzzy Hash: 6EB16271B18B4A86EB608F25E8803AA37E4FB847A4F580235DA5DE3794DF3CD519C744
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CryptErrorLast$Hash$Context$AcquireCreateDestroyFileParamPointerRelease
                                                                      • String ID: @$Failed to acquire crypto context.$Failed to get file pointer.$Failed to get hash value.$Failed to hash data block.$Failed to initiate hash.$Failed to read data block.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\cryputil.cpp
                                                                      • API String ID: 1716956426-2527826350
                                                                      • Opcode ID: 22613951719ddfd963dcee3be013201e57e4ca8e0c656bdd42f3a2475839783b
                                                                      • Instruction ID: 469a1213b7aa671caddca2b978cfd18e8e1dae5f390ea5de3dab29f317acf662
                                                                      • Opcode Fuzzy Hash: 22613951719ddfd963dcee3be013201e57e4ca8e0c656bdd42f3a2475839783b
                                                                      • Instruction Fuzzy Hash: FA819762F2869A86F771CF26D80077622E4BF84B90F594135DD0DE7A94DF3CD9098784
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Close
                                                                      • String ID: Failed to delete the dependency "%ls".$Failed to delete the dependent "%ls" under the dependency "%ls".$Failed to delete the dependents subkey under the dependency "%ls".$Failed to get the number of dependent subkeys under the dependency "%ls".$Failed to get the number of values under the dependency "%ls".$Failed to open root registry key "%ls".$Failed to open the dependents subkey under the dependency "%ls".$Failed to open the registry key for the dependency "%ls".$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\deputil.cpp
                                                                      • API String ID: 3535843008-1164676106
                                                                      • Opcode ID: 8c98d7096498dbc8c69f88c578c4fa4eb06364381833420200c8288e9a3840ad
                                                                      • Instruction ID: 1d6b6d7241260afa27bcf2dc931eddc2e63ab03a718fdf8c92d74ee67f230cfd
                                                                      • Opcode Fuzzy Hash: 8c98d7096498dbc8c69f88c578c4fa4eb06364381833420200c8288e9a3840ad
                                                                      • Instruction Fuzzy Hash: 26A18EA2B1CB1B86FB208BA2D8D17BA23E4AF44354F1C4535DE1DE6A84DF7CE4488344
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: PATCH="%ls"$Failed to add PATCH property to argument string.$Failed to add PATCH property to obfuscated argument string.$Failed to add action property to argument string.$Failed to add action property to obfuscated argument string.$Failed to add properties to argument string.$Failed to add properties to obfuscated argument string.$Failed to append patch.$Failed to build MSP path.$Failed to enable logging for package: %ls to: %ls$Failed to get cached path for MSP package: %ls$Failed to initialize external UI handler.$Failed to initialize internal UI for MSP package.$Failed to install MSP package.$Failed to semi-colon delimit patches.$Failed to uninstall MSP package.$WixBundleExecutePackageAction$WixBundleExecutePackageCacheFolder$d:\a\wix4\wix4\src\burn\engine\mspengine.cpp
                                                                      • API String ID: 0-3726864999
                                                                      • Opcode ID: 2de498033f03e5d447aca2b2c87ba6402b5d765bf1f6cd61e8994a212497dde9
                                                                      • Instruction ID: 63e47d4bd3055ddb04fe711f263be59420f63ae77f1d39b8ef286e75d2698ea5
                                                                      • Opcode Fuzzy Hash: 2de498033f03e5d447aca2b2c87ba6402b5d765bf1f6cd61e8994a212497dde9
                                                                      • Instruction Fuzzy Hash: E102C372B18B4A86EB20CB11E4506AEB7A4FB88794F580136DE4CE7B54DF3DE159CB00
                                                                      APIs
                                                                        • Part of subcall function 00007FF6570F3090: GetFileSizeEx.KERNEL32 ref: 00007FF6570F30A7
                                                                        • Part of subcall function 00007FF6570F3090: GetLastError.KERNEL32 ref: 00007FF6570F30B1
                                                                      • SetFilePointerEx.KERNEL32(?,00000000,?,00000000,?,00000001,?,?,00007FF6570CBF1F,?,?,?,?,00000000,00000000,?), ref: 00007FF6570F1FBE
                                                                      • SetEndOfFile.KERNEL32(?,?,?,?,00000000,00000000,?,00007FF6570CECC6), ref: 00007FF6570F1FC7
                                                                      • GetLastError.KERNEL32(?,?,?,?,00000000,00000000,?,00007FF6570CECC6), ref: 00007FF6570F1FD1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: File$ErrorLast$PointerSize
                                                                      • String ID: Failed to get size of source.$Failed to read from source.$Failed to reset target file pointer.$Failed to set end of target file.$Failed to write to target.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\fileutil.cpp
                                                                      • API String ID: 1903691966-2291708945
                                                                      • Opcode ID: ef2983a31ace188120a8058b9423d34906c611ed0e308f82cb4799c250dd8c03
                                                                      • Instruction ID: e839261e40a30c513d61925c9413b76182d57099c4ce504a2c427046fed9cccd
                                                                      • Opcode Fuzzy Hash: ef2983a31ace188120a8058b9423d34906c611ed0e308f82cb4799c250dd8c03
                                                                      • Instruction Fuzzy Hash: BF81B672B18B5682E7618B26E850B7A63D4FB84790F480135EE4DE7B54DF3CE548CB48
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Close
                                                                      • String ID: AUState$CurrentRebootAttempts$PendingFileRenameOperations$PendingFileRenameOperations2$SOFTWARE\Microsoft\ServerManager$SOFTWARE\Microsoft\Updates$SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\RebootInProgress$SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\RebootPending$SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update$SYSTEM\CurrentControlSet\Control\Session Manager$SYSTEM\CurrentControlSet\Control\Session Manager\FileRenameOperations$UpdateExeVolatile
                                                                      • API String ID: 3535843008-3032311648
                                                                      • Opcode ID: 49b7623804ec5af1792cd0e26b287ef11a3a56b42638c72f1400bbc35731a22d
                                                                      • Instruction ID: d1aa6754f40b8662c04b058cfaab9a961bdac28df9a8fa6a9dcf4a1607797b13
                                                                      • Opcode Fuzzy Hash: 49b7623804ec5af1792cd0e26b287ef11a3a56b42638c72f1400bbc35731a22d
                                                                      • Instruction Fuzzy Hash: 8A4196A2B0875BC6FB20AB21D841AF523D0AF597D8F891132DD0DE7A95DF6CE149C304
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: BA aborted plan restore related bundle.$Failed to add to plan related bundle: %ls$Failed to allocate the custom working directory.$Failed to allocate the list of ancestors.$Failed to allocate the list of dependencies to ignore.$Failed to append restore related bundle action to plan.$Failed to begin plan dependency actions for related bundle package: %ls$Failed to begin plan dependency actions to package: %ls$Failed to calculate plan for related bundle: %ls$Failed to check the dictionary for a related bundle provider key: "%ls".$Failed to complete plan dependency actions for related bundle package: %ls$Failed to copy the list of dependencies to ignore.$Failed to create dictionary for planned packages.$Failed to get the list of dependencies to ignore.$Failed to grow plan's array of restore related bundle actions.$Failed to plan related bundle package provider actions.$d:\a\wix4\wix4\src\burn\engine\plan.cpp
                                                                      • API String ID: 0-2008653302
                                                                      • Opcode ID: 99fb9671b880673ce46979269a9774a41e386a632474ad8ab5a0102e74933644
                                                                      • Instruction ID: 2d6b5704b6abece34c51e648f4c34585e225d0b13c8dc5a991e61066bc4ccd89
                                                                      • Opcode Fuzzy Hash: 99fb9671b880673ce46979269a9774a41e386a632474ad8ab5a0102e74933644
                                                                      • Instruction Fuzzy Hash: 7912E1B2B08A8A86EB648B15D44877AB3E9FB84385F184135DA0DE77D4DF3CE458C714
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Aborted transferring working path to unverified path for payload: %ls.$Failed to create unverified path.$Failed to find payload: %ls in working path: %ls and unverified path: %ls$Failed to get cached path for package with cache id: %ls$Failed to move verified file to complete payload path: %ls$Failed to reset permissions on unverified cached payload: %ls$Failed to transfer working path to unverified path for payload: %ls.$Failed to verify payload: %ls at path: %ls$copying$d:\a\wix4\wix4\src\burn\engine\cache.cpp$moving
                                                                      • API String ID: 0-1123430254
                                                                      • Opcode ID: 21c607fde78656ea0af1cbd3214195cc5f6d5847ee0ef46d9fad955cb31a2b4c
                                                                      • Instruction ID: 661c1968c249cd1980684be9ecde0a01dc66b70ee5a29631f04a32016ee9c492
                                                                      • Opcode Fuzzy Hash: 21c607fde78656ea0af1cbd3214195cc5f6d5847ee0ef46d9fad955cb31a2b4c
                                                                      • Instruction Fuzzy Hash: 3EA19F76718B4682EB208F66E8806AA73E4FB88784F444135FE8DE7B59DF7CD1158704
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$CloseHandleLookupOpenPrivilegeProcessTokenValue
                                                                      • String ID: Failed to adjust token to add privilege: %ls$Failed to get privilege LUID: %ls$Failed to get process token to adjust privileges.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\procutil.cpp
                                                                      • API String ID: 1673749002-2883319381
                                                                      • Opcode ID: fe9d2d278bc2d0aa03a023330ebbcf48377f5e497944df9345d58de9ad3c922f
                                                                      • Instruction ID: 885d47f3db16e33b97a839bd4801e0461f1dde48fcecc1fc7d7d4b9040c33d4d
                                                                      • Opcode Fuzzy Hash: fe9d2d278bc2d0aa03a023330ebbcf48377f5e497944df9345d58de9ad3c922f
                                                                      • Instruction Fuzzy Hash: D851A571F1874A8AFB10CF66E8853AA63E4AF48B50F58413ADA4DD3654CF3CD509C744
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: FreeLibrary
                                                                      • String ID: Failed to get OS info.$Failed to set variant value.$d:\a\wix4\wix4\src\burn\engine\variable.cpp
                                                                      • API String ID: 3664257935-2618661516
                                                                      • Opcode ID: 2db4bdd0001c59e4aa0796259fda7b12461a35bfaf5bde8f15e37dba9e5f5281
                                                                      • Instruction ID: f795cf0c1bed547571db19553f8bc94833edd674530e85929d4294f0eb931e9e
                                                                      • Opcode Fuzzy Hash: 2db4bdd0001c59e4aa0796259fda7b12461a35bfaf5bde8f15e37dba9e5f5281
                                                                      • Instruction Fuzzy Hash: EB517EB2A1CB8E86EB609B65E4841BD27E1FB49784F0C0035E94DE7B94DE3CE50A8700
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: BA aborted cache acquire begin.$BA aborted cache acquire resolving.$Failed to compare '%ls' to '%ls'.$Failed to copy payload: %ls$Failed to determine if payload paths were equivalent, source: %ls, destination: %ls.$Failed to download payload: %ls$Failed to extract container for payload: %ls$Failed to resolve source, payload: %ls, package: %ls, container: %ls$Failed to search local source.$d:\a\wix4\wix4\src\burn\engine\apply.cpp
                                                                      • API String ID: 0-1652660176
                                                                      • Opcode ID: 09fdb8d960be019bac527b6bef8af59234a21c63b06d788ff599e6fa33b5e26c
                                                                      • Instruction ID: d3d0114e934fbd994e152b3bf85f605615e4d35af3c1d0f21b3641f361e65851
                                                                      • Opcode Fuzzy Hash: 09fdb8d960be019bac527b6bef8af59234a21c63b06d788ff599e6fa33b5e26c
                                                                      • Instruction Fuzzy Hash: 233279B2B18A5A8AE760CF65D4806AEB3E9FB48784F184135DE4DE7B54DF38E409C710
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                      • String ID:
                                                                      • API String ID: 3140674995-0
                                                                      • Opcode ID: f0cf7bd9e4cc2a76a56b3a9d04e710952a6c06f4d5dee41621f74f624ae6ed04
                                                                      • Instruction ID: bfead3e9af825b909bdd8264c4b7bae69d02beafecded0fb58c196db730a32c7
                                                                      • Opcode Fuzzy Hash: f0cf7bd9e4cc2a76a56b3a9d04e710952a6c06f4d5dee41621f74f624ae6ed04
                                                                      • Instruction Fuzzy Hash: B9314DB6609B8586EBA0CF60E8403ED73A4FB84744F48403AEA4DD7B98DF78D548C718
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                      • String ID:
                                                                      • API String ID: 1239891234-0
                                                                      • Opcode ID: dd397338ec1154c038745e4b552c8848acb7150cb8a925169b08ec19b4cfdff6
                                                                      • Instruction ID: 18f03aa7d418a793fd0a804fc4d72fef31eb042746edc99ae38ecf581a33fa8b
                                                                      • Opcode Fuzzy Hash: dd397338ec1154c038745e4b552c8848acb7150cb8a925169b08ec19b4cfdff6
                                                                      • Instruction Fuzzy Hash: 9B3191B6618F8586DB60CF24E8402AE73A0FB89754F580136EA8DD7B58EF3CD549CB04
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLastNameUser
                                                                      • String ID: Failed to get the user name.$Failed to set variant value.$d:\a\wix4\wix4\src\burn\engine\variable.cpp
                                                                      • API String ID: 2054405381-561454448
                                                                      • Opcode ID: d612b94d3614895253c97630b7148fd6dd8cb543d1cb525fad57538f601ea861
                                                                      • Instruction ID: 8778b71afee76795cfd12f123c59bb42372730751b696e661d725d0282c14cd8
                                                                      • Opcode Fuzzy Hash: d612b94d3614895253c97630b7148fd6dd8cb543d1cb525fad57538f601ea861
                                                                      • Instruction Fuzzy Hash: F61172A1B18B8682FB209B15E89476A63A0FF84794F884035DA8DD7A55EF2CD51D8B00
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: FileFindFirst_invalid_parameter_noinfo
                                                                      • String ID:
                                                                      • API String ID: 2227656907-0
                                                                      • Opcode ID: 9569b9c0d11f0f413ef65a1dff9195b99827b5b19e9f0eb0b95eec3e638f3f1f
                                                                      • Instruction ID: 0cc9eade1a30d7f5409fb52b079838a6218b350d57a0b81d2133251c62e43945
                                                                      • Opcode Fuzzy Hash: 9569b9c0d11f0f413ef65a1dff9195b99827b5b19e9f0eb0b95eec3e638f3f1f
                                                                      • Instruction Fuzzy Hash: 75B1C4A2B1879A41EB609B25D8041BAA3D1FB44BE4F4C5131EA4EE7BC5DE3CF4498308
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CreateDecryptDirectoryErrorFileLast
                                                                      • String ID: Failed create acquisition folder.$d:\a\wix4\wix4\src\burn\engine\cache.cpp
                                                                      • API String ID: 4153065963-4185204549
                                                                      • Opcode ID: 31d8d7e0e87acfede34b7408c3ad5307cd86d43e3fd238e7a074322bbf165390
                                                                      • Instruction ID: 8e5c39cbe902b138430ac0f9da28e1973a848be96c68793eb0694ddfe8e68faa
                                                                      • Opcode Fuzzy Hash: 31d8d7e0e87acfede34b7408c3ad5307cd86d43e3fd238e7a074322bbf165390
                                                                      • Instruction Fuzzy Hash: D6F09066B18A4A83E7108F26E4801BA63E1FBC8784F984035DA5CD7764DF3CD45A8B04
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: memcpy_s
                                                                      • String ID:
                                                                      • API String ID: 1502251526-0
                                                                      • Opcode ID: cc81cd3ac1b567683db4a9a378c90754975d486612a1ac658515e2d66ad77290
                                                                      • Instruction ID: da5ed8eee1a539ce1950fb20e7cfcd38bba56916466aabaf54060646949710f0
                                                                      • Opcode Fuzzy Hash: cc81cd3ac1b567683db4a9a378c90754975d486612a1ac658515e2d66ad77290
                                                                      • Instruction Fuzzy Hash: 10C1E4B2B2868E87E7248F15A04466AB7D1F784B84F489235DF4AEB744DF3DE845CB40
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionRaise_clrfp
                                                                      • String ID:
                                                                      • API String ID: 15204871-0
                                                                      • Opcode ID: 62a65e8e68d52042a0e1946782109eadefa1f3f61b0d6ee731664c0ed1f695e5
                                                                      • Instruction ID: b79c561ff54be2980a325274e9a19e314c9c141b42f6b01dd87e01dfd600f46f
                                                                      • Opcode Fuzzy Hash: 62a65e8e68d52042a0e1946782109eadefa1f3f61b0d6ee731664c0ed1f695e5
                                                                      • Instruction Fuzzy Hash: 8BB138B3614B8A8AEB15CF29D8863683BE0F744B48F198926DE5DC77A8CF39D455C700
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Find$CloseFileFirst
                                                                      • String ID:
                                                                      • API String ID: 2295610775-0
                                                                      • Opcode ID: e0d6984bcc9757d2926cda4b2d61a9e377d07a2c4eda70cd5c0a03789cefe777
                                                                      • Instruction ID: 86ece6f300885cac6b8d78846c83d6b49bcc286cf9ad3cb92a7638360950e493
                                                                      • Opcode Fuzzy Hash: e0d6984bcc9757d2926cda4b2d61a9e377d07a2c4eda70cd5c0a03789cefe777
                                                                      • Instruction Fuzzy Hash: 5F019675B0968581EB70CB15E44566973D0FB88BA4F484231DD9CD7B84CF3CE50A8B00
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $
                                                                      • API String ID: 0-227171996
                                                                      • Opcode ID: 329c1cafed81ea7fb3e0d374ec61d91405ddcb2724f8b376174e0f80c7b4a995
                                                                      • Instruction ID: 3115810c1fe946f6fd2ca0457842f49c6f339ba6e2d3bfcfb180734ba55c0e9f
                                                                      • Opcode Fuzzy Hash: 329c1cafed81ea7fb3e0d374ec61d91405ddcb2724f8b376174e0f80c7b4a995
                                                                      • Instruction Fuzzy Hash: 55E190F2A2874A85EF688F25815813D23E0FF45B48F1C4235DA4FE7698DE39E859C708
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: e+000$gfff
                                                                      • API String ID: 0-3030954782
                                                                      • Opcode ID: 6a5ef61c77c0e5bf8e7cb535029f032ef04d5b4af68dc8fe3c252bbf8ea3ebb7
                                                                      • Instruction ID: 4e281e5fb4f6c0bb14092e6896532eb30f55fb462849851af3c9c5463b6b37fb
                                                                      • Opcode Fuzzy Hash: 6a5ef61c77c0e5bf8e7cb535029f032ef04d5b4af68dc8fe3c252bbf8ea3ebb7
                                                                      • Instruction Fuzzy Hash: 885157E6B183E946E7258B35D8007696BD1E794B94F0C9232CBA8DBBC1DE3DD4498704
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c5bd680396472452cf544b22d0b8cdbc9226a7d8252b8d1b8dd7f91ab9b7df97
                                                                      • Instruction ID: 836bd91c8bb163a77dee6af52f5c1f9db242406cda342304248e11fdc4403b65
                                                                      • Opcode Fuzzy Hash: c5bd680396472452cf544b22d0b8cdbc9226a7d8252b8d1b8dd7f91ab9b7df97
                                                                      • Instruction Fuzzy Hash: 4C2233E1B1865742EB28D73BCA6057D57D1EF84B80B0C8031CF0DE3AA6DE29F959D681
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 25e8e40c479a1db29b81c02b322a209602ca22b4a94111bdb6f8812a63089a74
                                                                      • Instruction ID: da0662b46d3baaa6c3e884cb723d23e2b129de75fef1b49bfe4a67a90a61cbd7
                                                                      • Opcode Fuzzy Hash: 25e8e40c479a1db29b81c02b322a209602ca22b4a94111bdb6f8812a63089a74
                                                                      • Instruction Fuzzy Hash: 6C81F5F2A0C79985E774CB19944037AB6D1FB45794F18823ADA8DD3B89DF3DE40A8B04
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4511e46d3dad8bb9131fcbe58f47e52a3bb0c7fd98dab0744a1f68c8f35f932a
                                                                      • Instruction ID: 05d37ce2d4030e76f607982b780b6f125660ff5ea4edae4e4a9c4329e958bd3f
                                                                      • Opcode Fuzzy Hash: 4511e46d3dad8bb9131fcbe58f47e52a3bb0c7fd98dab0744a1f68c8f35f932a
                                                                      • Instruction Fuzzy Hash: B85170B6A1875A86E7248B29C04023877E1EB45F68F2C5131CA8DE77D4CF3AF846C749
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: ccef08dcac92de96f80e62e39422300b1b07a4443c4a4c576b31c173fb34a7b9
                                                                      • Instruction ID: 4ac247e1ea4f7ff7e9f5cf47a2099f66b3501a3553523d089975205a6fe6c80b
                                                                      • Opcode Fuzzy Hash: ccef08dcac92de96f80e62e39422300b1b07a4443c4a4c576b31c173fb34a7b9
                                                                      • Instruction Fuzzy Hash: 18516FB6A1875986E764CB29C04463837E1EB44B68F2C4131CE4DE77D4DF3AE886C788
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: aeaa4d226cfc6ad080383ae9afbcffa98b1d4b02c4f348a8229da7f61345b46b
                                                                      • Instruction ID: 60810ee4ac7664fa38e363ac253937669c435c4ea814c6c1f8efb6a6999840d4
                                                                      • Opcode Fuzzy Hash: aeaa4d226cfc6ad080383ae9afbcffa98b1d4b02c4f348a8229da7f61345b46b
                                                                      • Instruction Fuzzy Hash: 075161B6A18B5986E7258B29D05423837E0EB54BA8F2C4131CE4DE77D8CF3AE857C744
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9737d1d36a664a2d1eac21050ef45ebe19750109be73a891a133502aaa51538e
                                                                      • Instruction ID: 93cec9d79286c87273f25f29e5e70feeb230d8e9736691415e53f21cfe0aaada
                                                                      • Opcode Fuzzy Hash: 9737d1d36a664a2d1eac21050ef45ebe19750109be73a891a133502aaa51538e
                                                                      • Instruction Fuzzy Hash: 204188B2F1834B86F6B95F25A74453DF6DAAB90345F6C9039C50DF3588CD38A90D8622
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 140e1e4fe610231bdf40aa9f7ae1b81fc1c56197c0420741d93748ed80b38af4
                                                                      • Instruction ID: 65020763db02e03f1dcb38f351a8426dd50e58d35df690c97f6a644025d3884b
                                                                      • Opcode Fuzzy Hash: 140e1e4fe610231bdf40aa9f7ae1b81fc1c56197c0420741d93748ed80b38af4
                                                                      • Instruction Fuzzy Hash: C5F068727182598FEBE9DF2DA84262977D0E708384F588139D58DD3B14DA7C94909F04
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a2d87e52002873939cdd41a68ab5698367994441df2833cf10978d5824ac9a8d
                                                                      • Instruction ID: 378ebe113476c79c4c1f964d7dd6e949b76758b94e2c170b1b89a3181e5a9f9d
                                                                      • Opcode Fuzzy Hash: a2d87e52002873939cdd41a68ab5698367994441df2833cf10978d5824ac9a8d
                                                                      • Instruction Fuzzy Hash: 30A001A990895AD0E7948B00E85406822A1BB50354B484132E41DE50A0DE6CA4888208
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: _cwprintf_s_l
                                                                      • String ID: (deleted action)$ bundle id: %ls$ bundle provider key: %ls$ can affect machine state: %hs$ disable-rollback: %hs$ disallow-removal: %hs$ downgrade: %hs$ layout directory: %ls$ overall progress ticks: %u$ per-machine: %hs$ registration options: %hs$ use-forward-compatible: %hs$ Clean action[%u]: CLEAN_COMPATIBLE_PACKAGE package id: %ls$ Clean action[%u]: CLEAN_PACKAGE package id: %ls$ Dependency action[%u]: PLANNED_PROVIDER key: %ls, name: %ls$--- Begin plan dump ---$--- End plan dump ---$Plan action: %hs$Plan cache size: %llu$Plan execute package count: %u$Restore action[%u]: RELATED_BUNDLE package id: %ls, action: %hs, ignore dependencies: %ls
                                                                      • API String ID: 2941638530-1818579274
                                                                      • Opcode ID: 5a1bb4c31ab7ea3ff988ac4ddb390d951e7e468c61ea87ebe580e861683dac08
                                                                      • Instruction ID: cf82499a450f6eb5c148de32371c176de37d380f31872c78b6ca71a4d5576470
                                                                      • Opcode Fuzzy Hash: 5a1bb4c31ab7ea3ff988ac4ddb390d951e7e468c61ea87ebe580e861683dac08
                                                                      • Instruction Fuzzy Hash: A4B1B1F2A0464A92DB24AF14D4501BD63A5FB84B94F0C4136DA1DFB39ADE3DE988C790
                                                                      APIs
                                                                      Strings
                                                                      • %ls action[%u]: ROLLBACK_BOUNDARY_START id: %ls, vital: %ls, xrefs: 00007FF6570C53A3
                                                                      • Patch[%u]: msp package id: %ls, action: %hs, xrefs: 00007FF6570C515E
                                                                      • %ls action[%u]: EXE_PACKAGE package id: %ls, action: %hs, xrefs: 00007FF6570C5197
                                                                      • %ls action[%u]: MSP_TARGET package id: %ls, action: %hs, target product code: %ls, target per-machine: %hs, action msi property: %ls, ui level: %u, disable externaluihandler: %hs, file versioning: %hs, log path: %ls, xrefs: 00007FF6570C5056
                                                                      • %ls action[%u]: CHECKPOINT id: %u, msi transaction id: %ls, xrefs: 00007FF6570C5277
                                                                      • (none), xrefs: 00007FF6570C526D
                                                                      • %ls action[%u]: UNCACHE_PACKAGE id: %ls, xrefs: 00007FF6570C5216
                                                                      • %ls action[%u]: BEGIN_MSI_TRANSACTION id: %ls, xrefs: 00007FF6570C5363
                                                                      • Patch[%u]: order: %u, msp package id: %ls, xrefs: 00007FF6570C5092
                                                                      • %ls action[%u]: PACKAGE_DEPENDENCY package id: %ls, bundle provider key: %ls, xrefs: 00007FF6570C53CF
                                                                      • (deleted action), xrefs: 00007FF6570C54BE
                                                                      • Rollback, xrefs: 00007FF6570C4F57
                                                                      • %ls action[%u]: MSI_PACKAGE package id: %ls, action: %hs, action msi property: %ls, ui level: %u, disable externaluihandler: %hs, file versioning: %hs, log path: %ls, logging attrib: %u, xrefs: 00007FF6570C5119
                                                                      • %ls action[%u]: MSU_PACKAGE package id: %ls, action: %hs, log path: %ls, xrefs: 00007FF6570C52B7
                                                                      • %ls action[%u]: ROLLBACK_BOUNDARY_END, xrefs: 00007FF6570C5372
                                                                      • %ls action[%u]: UNINSTALL_MSI_COMPATIBLE_PACKAGE package id: %ls, compatible package id: %ls, cache id: %ls, log path: %ls, logging attrib: %u, xrefs: 00007FF6570C5316
                                                                      • %ls action[%u]: BUNDLE_PACKAGE package id: %ls, action: %hs, xrefs: 00007FF6570C51BC
                                                                      • Execute, xrefs: 00007FF6570C4F61
                                                                      • %ls action[%u]: PACKAGE_PROVIDER package id: %ls, xrefs: 00007FF6570C544B
                                                                      • %ls action[%u]: RELATED_BUNDLE package id: %ls, action: %hs, ignore dependencies: %ls, xrefs: 00007FF6570C51F3
                                                                      • Provider[%u]: key: %ls, action: %hs, xrefs: 00007FF6570C541A, 00007FF6570C5492
                                                                      • %ls action[%u]: COMMIT_MSI_TRANSACTION id: %ls, xrefs: 00007FF6570C5353
                                                                      • %ls action[%u]: WAIT_CACHE_PACKAGE id: %ls, event handle: 0x%p, xrefs: 00007FF6570C523C
                                                                      • yes, xrefs: 00007FF6570C5394
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: _cwprintf_s_l
                                                                      • String ID: (deleted action)$ Patch[%u]: msp package id: %ls, action: %hs$ Patch[%u]: order: %u, msp package id: %ls$ Provider[%u]: key: %ls, action: %hs$ Execute$ Rollback$%ls action[%u]: BEGIN_MSI_TRANSACTION id: %ls$%ls action[%u]: BUNDLE_PACKAGE package id: %ls, action: %hs$%ls action[%u]: CHECKPOINT id: %u, msi transaction id: %ls$%ls action[%u]: COMMIT_MSI_TRANSACTION id: %ls$%ls action[%u]: EXE_PACKAGE package id: %ls, action: %hs$%ls action[%u]: MSI_PACKAGE package id: %ls, action: %hs, action msi property: %ls, ui level: %u, disable externaluihandler: %hs, file versioning: %hs, log path: %ls, logging attrib: %u$%ls action[%u]: MSP_TARGET package id: %ls, action: %hs, target product code: %ls, target per-machine: %hs, action msi property: %ls, ui level: %u, disable externaluihandler: %hs, file versioning: %hs, log path: %ls$%ls action[%u]: MSU_PACKAGE package id: %ls, action: %hs, log path: %ls$%ls action[%u]: PACKAGE_DEPENDENCY package id: %ls, bundle provider key: %ls$%ls action[%u]: PACKAGE_PROVIDER package id: %ls$%ls action[%u]: RELATED_BUNDLE package id: %ls, action: %hs, ignore dependencies: %ls$%ls action[%u]: ROLLBACK_BOUNDARY_END$%ls action[%u]: ROLLBACK_BOUNDARY_START id: %ls, vital: %ls$%ls action[%u]: UNCACHE_PACKAGE id: %ls$%ls action[%u]: UNINSTALL_MSI_COMPATIBLE_PACKAGE package id: %ls, compatible package id: %ls, cache id: %ls, log path: %ls, logging attrib: %u$%ls action[%u]: WAIT_CACHE_PACKAGE id: %ls, event handle: 0x%p$(none)$yes
                                                                      • API String ID: 2941638530-2015118038
                                                                      • Opcode ID: d25d9d183520bb07881b7f61e340b70487bdd30e12210778b596ed243b53cf58
                                                                      • Instruction ID: ffaf7432c70ba240c805df4a82162312dc2f0753bff08a48cada54cfa1e6b6db
                                                                      • Opcode Fuzzy Hash: d25d9d183520bb07881b7f61e340b70487bdd30e12210778b596ed243b53cf58
                                                                      • Instruction Fuzzy Hash: 01F1B6B6A09B4AC6DA24CB05E48886DB7E4FB88BD8F285135DA4DD7764CF3CE444C700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: String$CompareFree
                                                                      • String ID: Failed get attributes for ATOM link.$Failed to allocate ATOM link href.$Failed to allocate ATOM link rel.$Failed to allocate ATOM link title.$Failed to allocate ATOM link type.$Failed to allocate ATOM link value.$Failed to get child nodes of ATOM link element.$Failed to parse ATOM link length.$Failed to parse unknown ATOM link attribute: %ls$Failed to parse unknown ATOM link element: %ls$Failed to process all ATOM link attributes.$Failed to process all ATOM link elements.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\atomutil.cpp$href$length$rel$title$type
                                                                      • API String ID: 3589242889-3014251594
                                                                      • Opcode ID: e9fcde556c8a096618963259ad8e162a2f8d36ce7f3a36a3da1c481a157f7e40
                                                                      • Instruction ID: caf095241dce2597c26959f8155c2eafcc649c7466c2b0d77475e5f10112e5da
                                                                      • Opcode Fuzzy Hash: e9fcde556c8a096618963259ad8e162a2f8d36ce7f3a36a3da1c481a157f7e40
                                                                      • Instruction Fuzzy Hash: EEC185A2B08B5A86EB14DF25D8903B923A4FF44B84F584132D90DE7BA4DF3DE949C744
                                                                      APIs
                                                                      • CompareStringW.KERNEL32(?,?,?,?,?,?,?,00007FF6570FC82B,?,?,00000000,?,?,00000000,00000000,00007FF6570FCA6D), ref: 00007FF6570FBFDE
                                                                      • CompareStringW.KERNEL32(?,?,?,?,?,?,?,00007FF6570FC82B,?,?,00000000,?,?,00000000,00000000,00007FF6570FCA6D), ref: 00007FF6570FC006
                                                                      • CompareStringW.KERNEL32(?,?,?,?,?,?,?,00007FF6570FC82B,?,?,00000000,?,?,00000000,00000000,00007FF6570FCA6D), ref: 00007FF6570FC032
                                                                      • CompareStringW.KERNEL32(?,?,?,?,?,?,?,00007FF6570FC82B,?,?,00000000,?,?,00000000,00000000,00007FF6570FCA6D), ref: 00007FF6570FC0C6
                                                                      • CompareStringW.KERNEL32(?,?,?,?,?,?,?,00007FF6570FC82B,?,?,00000000,?,?,00000000,00000000,00007FF6570FCA6D), ref: 00007FF6570FC12E
                                                                      • CompareStringW.KERNEL32(?,?,?,?,?,?,?,00007FF6570FC82B,?,?,00000000,?,?,00000000,00000000,00007FF6570FCA6D), ref: 00007FF6570FC16A
                                                                      • CompareStringW.KERNEL32(?,?,?,?,?,?,?,00007FF6570FC82B,?,?,00000000,?,?,00000000,00000000,00007FF6570FCA6D), ref: 00007FF6570FC19F
                                                                      • CompareStringW.KERNEL32(?,?,?,?,?,?,?,00007FF6570FC82B,?,?,00000000,?,?,00000000,00000000,00007FF6570FCA6D), ref: 00007FF6570FC1D8
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CompareString
                                                                      • String ID: Failed to allocate enclosure URL.$Failed to allocate memory for digest.$Failed to copy local name.$Failed to decode digest value.$Failed to get string length of digest value.$Invalid digest length (%Iu) for digest algorithm (%u).$Unknown algorithm type for digest.$algorithm$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\apuputil.cpp$digest$http://appsyndication.org/2006/appsyn$md5$name$sha1$sha256$sha512
                                                                      • API String ID: 1825529933-539980605
                                                                      • Opcode ID: 1cc10535ef566eac78a8370956d8aec5142afde95054be7f4792f8207bdd26da
                                                                      • Instruction ID: 6580f0d956c0724981eaaaac0cb7a6b006d0fbbe5ef61a6d89a046b30af1daa8
                                                                      • Opcode Fuzzy Hash: 1cc10535ef566eac78a8370956d8aec5142afde95054be7f4792f8207bdd26da
                                                                      • Instruction Fuzzy Hash: FFB1C7B1B1874A82E7308B11E84066A73E0FB48BA4F5C4536CA4DE7B64DF3CE559C748
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CreateErrorFileLastSleep
                                                                      • String ID: Failed to allocate name of parent cache pipe.$Failed to allocate name of parent logging pipe.$Failed to allocate name of parent pipe.$Failed to open companion process with PID: %u$Failed to open parent cache pipe: %ls$Failed to open parent logging pipe: %ls$Failed to open parent pipe: %ls$Failed to verify parent cache pipe: %ls$Failed to verify parent logging pipe: %ls$Failed to verify parent pipe: %ls$\\.\pipe\%ls$\\.\pipe\%ls.Cache$\\.\pipe\%ls.Log$d:\a\wix4\wix4\src\burn\engine\pipe.cpp
                                                                      • API String ID: 408151869-3514438494
                                                                      • Opcode ID: 73ef25ee2d0b98da257e340f395b44bf36e08219f5c47a25812d1a09cf944659
                                                                      • Instruction ID: 5c61d29e62c8a92012748d0aae38d0b92c14938fb7ff4eedf08249edd23fff05
                                                                      • Opcode Fuzzy Hash: 73ef25ee2d0b98da257e340f395b44bf36e08219f5c47a25812d1a09cf944659
                                                                      • Instruction Fuzzy Hash: 50A196A1B18B4A86FB608F65E9803AA23E4FF58754F080235DA4DE37D5EF3CE5198744
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CloseHandle$CreateCriticalSectionThread$DeleteErrorInitializeLastMutexRelease
                                                                      • String ID: Another per-user setup is already executing.$Apply cannot be done without a successful Plan.$BA aborted apply begin.$Failed to cache engine to working directory.$Failed to create cache thread.$Failed to elevate.$Failed to initialize apply in elevated process.$Failed to register bundle.$Failed to set initial apply variables.$Failed to wait for cache thread after execute.$Failed to wait for cache thread before execute.$Failed while caching, aborting execution.$Plans cannot be applied multiple times.$d:\a\wix4\wix4\src\burn\engine\core.cpp
                                                                      • API String ID: 628592193-1871941313
                                                                      • Opcode ID: 6d41f309899205dcb8e3d7d2598fd32aaf18c1537388de3000b13968b767cf0a
                                                                      • Instruction ID: ec4b1104796efb5b52fd787d82aba215ec5863a3dcfaf149f256d38175e123c7
                                                                      • Opcode Fuzzy Hash: 6d41f309899205dcb8e3d7d2598fd32aaf18c1537388de3000b13968b767cf0a
                                                                      • Instruction Fuzzy Hash: 281258B2B1864A8AEB20CF65D4447FD23E4FB44788F58013ADA0DE6A98DF3CE549C750
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CloseCreateErrorHandleLastProcess$CodeExitMutexObjectReleaseSingleUuidWait
                                                                      • String ID: %ls$%ls /pipe %ls$Failed to CreateProcess on path: %ls$Failed to allocate event name.$Failed to allocate section name.$Failed to append netfx chainer args.$Failed to append user args.$Failed to create netfx chainer guid.$Failed to create netfx chainer.$Failed to get netfx return code.$Failed to process netfx chainer message.$Failed to wait for netfx chainer process to complete$NetFxEvent.%ls$NetFxSection.%ls$d:\a\wix4\wix4\src\burn\engine\netfxchainer.cpp
                                                                      • API String ID: 4018796558-3586658835
                                                                      • Opcode ID: 7ff0c7f8915f3bea66e06f8a7c5add47607887ab9124e02ff881f0a671ee7c84
                                                                      • Instruction ID: 58a7d7df00c3e5bb50c372a75faab94032f06c9c78309205cf132de5120ed400
                                                                      • Opcode Fuzzy Hash: 7ff0c7f8915f3bea66e06f8a7c5add47607887ab9124e02ff881f0a671ee7c84
                                                                      • Instruction Fuzzy Hash: 15C1A2B2B08B5AC5EB20CB55E8402AAA7E4FB44B94F480135DE4CE7B54DF3CE549C748
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Cache thread exited unexpectedly with exit code: %u.$Failed to execute BUNDLE package.$Failed to execute EXE package.$Failed to execute MSI package.$Failed to execute MSP package.$Failed to execute MSU package.$Failed to execute begin MSI transaction action.$Failed to execute commit MSI transaction action.$Failed to execute dependency action.$Failed to execute package provider registration action.$Failed to execute related bundle.$Failed to execute uninstall MSI compatible package.$Failed to get cache thread exit code.$Failed to wait for cache check-point.$Invalid execute action.$d:\a\wix4\wix4\src\burn\engine\apply.cpp
                                                                      • API String ID: 0-3642936599
                                                                      • Opcode ID: 4461807d518ffdfbc06a3433f8ace9fb035db67dc9c8d03447e9c98d3300a2a6
                                                                      • Instruction ID: 1bc94f02d8b3d0cbe225e7615e4d130acf2555c9ec9b1ddd0bede48be5fc5176
                                                                      • Opcode Fuzzy Hash: 4461807d518ffdfbc06a3433f8ace9fb035db67dc9c8d03447e9c98d3300a2a6
                                                                      • Instruction Fuzzy Hash: 77E1E671B08B4686F720CB65E85027AA7E9FB487A5F484136DA4DE7B94EF3CD509C310
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Close_cwprintf_s_l
                                                                      • String ID: Failed to change value type.$Failed to format key string.$Failed to format value string.$Failed to open registry key.$Failed to query registry key value.$Failed to read registry value.$Failed to set variable.$Registry key not found. Key = '%ls'$Registry value not found. Key = '%ls', Value = '%ls'$RegistrySearchValue failed: ID '%ls', HRESULT 0x%x$Unsupported registry key value type. Type = '%u'$d:\a\wix4\wix4\src\burn\engine\search.cpp
                                                                      • API String ID: 3644356412-3422224897
                                                                      • Opcode ID: b8b518e273067d4a52a1db28b1473d59c9b24b342d70c6522dd798828085579e
                                                                      • Instruction ID: 455bd11b3050e571425c672c896bc7e5e2f604413054a5fd299c2a13cca187ea
                                                                      • Opcode Fuzzy Hash: b8b518e273067d4a52a1db28b1473d59c9b24b342d70c6522dd798828085579e
                                                                      • Instruction Fuzzy Hash: 92B192A1B1861A9AFB608BA1D4507BE23E4FF54788F580136EE0DE7A85DF6CE5498340
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CloseCreateCriticalErrorFileInitializeLastSection
                                                                      • String ID: %s\%s$Failed to build variable registry key path.$Failed to create registration variable key.$Failed to delete registration variable value.$Failed to enumerate value %u$Failed to get variable value.$Failed to query registration variable count.$Failed to read variables.$Failed to set variable value.$Failed to write state to file: %ls$Unsupported variable type.$d:\a\wix4\wix4\src\burn\engine\registration.cpp$variables
                                                                      • API String ID: 620435854-3789814747
                                                                      • Opcode ID: a3f09dae533cd9d29f617a33f20cc57e93924de36a08e70a247403612866ff15
                                                                      • Instruction ID: 5f00a14cfce4d288d58160118cbc51a091e2ddf9a798cdfd153847f749565b87
                                                                      • Opcode Fuzzy Hash: a3f09dae533cd9d29f617a33f20cc57e93924de36a08e70a247403612866ff15
                                                                      • Instruction Fuzzy Hash: 17A17FA2B48A5A87FB11DBA1D4902BD33E5BB94784F480135DE4DE3A98DF7CE51AC340
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: -%ls=%ls$-q -%ls %ls %ls %u$BA aborted elevation requirement.$Failed to allocate parameters for elevated process.$Failed to connect to elevated child process.$Failed to create pipe and cache pipe.$Failed to create pipe name and client token.$Failed to elevate.$Failed to launch elevated child process: %ls$Failed to set log mode in elevated process command-line.$burn.elevated$burn.log.mode$d:\a\wix4\wix4\src\burn\engine\elevation.cpp$runas
                                                                      • API String ID: 0-4178128
                                                                      • Opcode ID: 0c2b65aecca9f91dcb69a14776ff531d92c03d493146b9d9c712afd5f75e9ee3
                                                                      • Instruction ID: 5d892a8715bf8d2561a10058a109cfb6f14f26cd6be7a517d579dc71ceb164b1
                                                                      • Opcode Fuzzy Hash: 0c2b65aecca9f91dcb69a14776ff531d92c03d493146b9d9c712afd5f75e9ee3
                                                                      • Instruction Fuzzy Hash: 1981B161B1874B86FB60CB61E4907BE63A0FB94344F680135EA4DEB795DF3DE6498300
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: NamedPipe$ErrorHandleLastState$ConnectCurrentProcessSleeplstrlen
                                                                      • String ID: Failed to read ACK from pipe.$Failed to reset pipe to blocking.$Failed to set pipe to non-blocking.$Failed to wait for child to connect to pipe.$Failed to write our process id to pipe.$Failed to write secret length to pipe.$Failed to write secret to pipe.$d:\a\wix4\wix4\src\burn\engine\pipe.cpp
                                                                      • API String ID: 2345975998-2019809298
                                                                      • Opcode ID: 3a763a79620a63c6faa91cadb862fbd9fb187e586ce759d2072a8ebfaf11646d
                                                                      • Instruction ID: b5080b6b79bee57ba44fde0a604d1e660fb1eb3da94baef1c48f68f093c29ff9
                                                                      • Opcode Fuzzy Hash: 3a763a79620a63c6faa91cadb862fbd9fb187e586ce759d2072a8ebfaf11646d
                                                                      • Instruction Fuzzy Hash: 8271E2A1F2874A86F710CB6AD9806B933E5BB48B94F984135CE0DE7794DF7CE5098704
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Close
                                                                      • String ID: Date$Failed to create the key for update registration.$Failed to get the formatted key path for update registration.$Failed to write %ls value.$InstalledBy$InstalledDate$InstallerName$InstallerVersion$LogonUser$PackageName$PackageVersion$Publisher$PublishingGroup$ReleaseType$ThisVersionInstalled$d:\a\wix4\wix4\src\burn\engine\registration.cpp
                                                                      • API String ID: 3535843008-2070796179
                                                                      • Opcode ID: d6e3de1f228bdbb393b358b280229b28ec2c360ad071cbacafba62d66b55823a
                                                                      • Instruction ID: 1af5584e985443bd1446995e27438589bfc229b4e64ccb7397b8178cd5784a3f
                                                                      • Opcode Fuzzy Hash: d6e3de1f228bdbb393b358b280229b28ec2c360ad071cbacafba62d66b55823a
                                                                      • Instruction Fuzzy Hash: 5F715FA5B08B4B82EB519B61D840BAA2394FB957D4F480032EE0DEB795DF3CE159C740
                                                                      APIs
                                                                      • SysFreeString.OLEAUT32 ref: 00007FF65709B430
                                                                        • Part of subcall function 00007FF657086828: GetProcessHeap.KERNEL32(?,?,00000000,00007FF657082158,?,?,?,?,?,?,00000000,00007FF657081F49,?,?,?,00000000), ref: 00007FF65708683C
                                                                      • SysFreeString.OLEAUT32 ref: 00007FF65709B3E9
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: FreeString$HeapProcess
                                                                      • String ID: Failed to allocate memory for software tag structs.$Failed to convert SoftwareTag text to UTF-8$Failed to get @Filename.$Failed to get @Path.$Failed to get @Regid.$Failed to get SoftwareTag text.$Failed to get next node.$Failed to get software tag count.$Failed to select software tag nodes.$Filename$Path$Regid$SoftwareTag$d:\a\wix4\wix4\src\burn\engine\registration.cpp
                                                                      • API String ID: 3485037438-1873729996
                                                                      • Opcode ID: c1f9bf87daf3b37bf44e61fe1a1b80752a6da04c16ed14f9d5411350a3a3eb2d
                                                                      • Instruction ID: f15ae6c73969f439d70e39ea98ad820967dc8f6337cb9d9bd31c70d907e64c65
                                                                      • Opcode Fuzzy Hash: c1f9bf87daf3b37bf44e61fe1a1b80752a6da04c16ed14f9d5411350a3a3eb2d
                                                                      • Instruction Fuzzy Hash: 1B9169A1B18A1B86FB109FA5D8902BD23E0FB54B94F584035DE0DEB7A5DF6DE809C344
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: String$CompareFree
                                                                      • String ID: Failed get attributes on ATOM unknown element.$Failed to allocate ATOM content scheme.$Failed to allocate ATOM content type.$Failed to allocate ATOM content value.$Failed to get child nodes of ATOM content element.$Failed to parse unknown ATOM content element: %ls$Failed to process all ATOM content attributes.$Failed to process all ATOM content elements.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\atomutil.cpp$type$url
                                                                      • API String ID: 3589242889-2167937548
                                                                      • Opcode ID: fab25e9a6cff75072a678a819a611e1ac356dc358d490ea37cb5b073c4456d6f
                                                                      • Instruction ID: 8003035c9ff04ebe35639e63356f01052792f995b7419c2a903510aaf240d656
                                                                      • Opcode Fuzzy Hash: fab25e9a6cff75072a678a819a611e1ac356dc358d490ea37cb5b073c4456d6f
                                                                      • Instruction Fuzzy Hash: B8915FA2B08A5A86EB54DF65D8803B923A0FF45B88F584132DA0DE7764DF3DE549C348
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Close$HandleMutexRelease
                                                                      • String ID: Failed to connect to unelevated process.$Failed to create elevated logging thread.$Failed to create finished event for logging thread.$Failed to create log event for logging thread.$Failed to create the message window.$Failed to open elevated log.$Failed to pump messages from parent process.$d:\a\wix4\wix4\src\burn\engine\engine.cpp
                                                                      • API String ID: 2585119886-4116955637
                                                                      • Opcode ID: 8336da03d7541b861453cf79fca67742efaf1534c52a47f5ae18a7860ec38f6e
                                                                      • Instruction ID: 7f7721348fd25d4432e50529bccd97f62daf377f26d27265bd80fe9a23bb6685
                                                                      • Opcode Fuzzy Hash: 8336da03d7541b861453cf79fca67742efaf1534c52a47f5ae18a7860ec38f6e
                                                                      • Instruction Fuzzy Hash: 03818D62B18B8A86EB21DF61E8807E933E4FB44354F980135DA4DE7A94DF3CE659C300
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ClassErrorLast$CreateRegisterUnregisterWindow
                                                                      • String ID: Failed to create window.$Failed to register window.$Unexpected return value from message pump.$WixBurnMessageWindow$d:\a\wix4\wix4\src\burn\engine\uithread.cpp
                                                                      • API String ID: 3976189915-2033051560
                                                                      • Opcode ID: 3d8165fdef7c1778e5dd7f12cd9bd14def3e345cbed08d886275d1ab36f8656e
                                                                      • Instruction ID: 10e011b9b633c3fa5390ed2a8e3b528c83121ee5876b43a745a60da5882773c6
                                                                      • Opcode Fuzzy Hash: 3d8165fdef7c1778e5dd7f12cd9bd14def3e345cbed08d886275d1ab36f8656e
                                                                      • Instruction Fuzzy Hash: A6618172B18B469AE720CF66E4806AD73E4FB48B44F58403ADA4DE3B54DF38E519C744
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Class$CursorDeleteErrorLastLoadMessageObjectPostRegisterUnregister
                                                                      • String ID: Failed to load splash screen.$Failed to register window.$Unexpected return value from message pump.$WixBurnSplashScreen$d:\a\wix4\wix4\src\burn\engine\splashscreen.cpp
                                                                      • API String ID: 4012016417-1790364600
                                                                      • Opcode ID: 0c6715a91b6f91f9a68a0033e1bf64849a15980fbc5315597352a7e4e888c664
                                                                      • Instruction ID: d5ff47df3de7798f7e37beaf4a9189ea8d44db110f1400b9f8a6636c3ac0d7e8
                                                                      • Opcode Fuzzy Hash: 0c6715a91b6f91f9a68a0033e1bf64849a15980fbc5315597352a7e4e888c664
                                                                      • Instruction Fuzzy Hash: 2F518DB6B18B46D6EB10CB62E4906AD33E0FB98B48F484135DA0DE7B54DF38E619C344
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$FileModuleName
                                                                      • String ID: Failed to allocate space for module path.$Failed to get max length of input buffer.$Failed to get path for executing process.$Failed to get size of path for executing process.$Failed to re-allocate more space for module path.$Unexpected failure getting path for executing process.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\pathutil.cpp
                                                                      • API String ID: 1026760046-3511924
                                                                      • Opcode ID: 902fc170f0bdd2ca30d4937ac6355a66afac27a7e292a50727cae38aed815fb4
                                                                      • Instruction ID: 9aac615cdeaae2c991152e0515a23721bcaa18aea3e23fc4dc588270f6996046
                                                                      • Opcode Fuzzy Hash: 902fc170f0bdd2ca30d4937ac6355a66afac27a7e292a50727cae38aed815fb4
                                                                      • Instruction Fuzzy Hash: 3251E5A1B18B4B83FB108F76E49013963D6AF84790F5C0136DA0DE77A1EE7CE9598714
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CloseHandle
                                                                      • String ID: /log:$"%ls" "%ls" /quiet /norestart$Failed to allocate WUSA.exe path.$Failed to append log path to MSU command-line.$Failed to append log switch to MSU command-line.$Failed to build MSU path.$Failed to ensure WU service was enabled to install MSU package.$Failed to find System32 directory.$Failed to format MSU install command.$Failed to get action arguments for MSU package.$Failed to get cached path for package: %ls$Failed to run MSU process$WixBundleExecutePackageCacheFolder$d:\a\wix4\wix4\src\burn\engine\msuengine.cpp$wusa.exe
                                                                      • API String ID: 2962429428-537596307
                                                                      • Opcode ID: 263fb4fe716705590c4251f4337118449c9d9bd845fbae92e64d6e57b3d6eb85
                                                                      • Instruction ID: 17a95dd7675e574531a364b62df0cad4fed583302bf2823985b4f2e86b48c2eb
                                                                      • Opcode Fuzzy Hash: 263fb4fe716705590c4251f4337118449c9d9bd845fbae92e64d6e57b3d6eb85
                                                                      • Instruction Fuzzy Hash: 21B19371B08A4A86FB60CFA5E4402BD67A4FB58788F584135EE4DE7B95DF3CE5098310
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Failed to launch approved exe: %ls$Failed to open the registry key for the approved exe path.$Failed to read approved exe WaitForInputIdle timeout.$Failed to read approved exe arguments.$Failed to read approved exe id.$Failed to read the value for the approved exe path.$Failed to send BURN_ELEVATION_MESSAGE_TYPE_LAUNCH_APPROVED_EXE_PROCESSID message to per-user process.$Failed to verify the executable path is in a secure location: %ls$Failed to write the approved exe process id to message buffer.$The executable path is not in a secure location: %ls$The per-user process requested unknown approved exe with id: %ls$d:\a\wix4\wix4\src\burn\engine\elevation.cpp$yes
                                                                      • API String ID: 0-3760680463
                                                                      • Opcode ID: 49abda448f05a181899f0d7d814cb81a599256138b5669f4f0a482871add6d11
                                                                      • Instruction ID: 3e215e8d29269a3befef733ffd9d43de5063f455b64b71f637a43b713fb877d8
                                                                      • Opcode Fuzzy Hash: 49abda448f05a181899f0d7d814cb81a599256138b5669f4f0a482871add6d11
                                                                      • Instruction Fuzzy Hash: CA9133B2B19A4B95EB10DF61D4802EE23A0FB58788F584536DE4DE7B59DF38E609C340
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: FreeString$HeapProcess
                                                                      • String ID: Failed get attributes on ATOM unknown element.$Failed to allocate ATOM unknown element name.$Failed to allocate ATOM unknown element namespace.$Failed to allocate ATOM unknown element value.$Failed to allocate unknown element.$Failed to enumerate all attributes on ATOM unknown element.$Failed to get unknown element name.$Failed to get unknown element namespace.$Failed to get unknown element value.$Failed to parse attribute on ATOM unknown element.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\atomutil.cpp
                                                                      • API String ID: 3485037438-2936770743
                                                                      • Opcode ID: 6306ccebe81bc0d71d4af1f65837bd19856a7b2922944d46dcbbf584579718b1
                                                                      • Instruction ID: f11d76ad622ac24f36c53b683789b9b51e38b3a4b8cd646a81aa55128e65562a
                                                                      • Opcode Fuzzy Hash: 6306ccebe81bc0d71d4af1f65837bd19856a7b2922944d46dcbbf584579718b1
                                                                      • Instruction Fuzzy Hash: 0D812EA5B09B5A86FF11DB25D89027923E4EF84B84F584436CE4DE37A4DF2DE50AC708
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalSection$ErrorLast$Heap$CloseCreateDeleteEnterFreeHandleInitializeLeaveLibraryLoadObjectProcessSemaphoreSingleWait
                                                                      • String ID: Failed to create queue for bootstrapper engine.$Failed to create semaphore for queue.$Failed to dequeue action.$Failed to load BA.$Failed to start bootstrapper application.$Failed to wait on queue event.$d:\a\wix4\wix4\src\burn\engine\engine.cpp
                                                                      • API String ID: 2225474240-197728619
                                                                      • Opcode ID: 187f2d647a2aa6bdef5957d3c5cb0c06ae32490c230674121bba88506eead7d0
                                                                      • Instruction ID: 6f53c9dccf19e274bb2090ca62ae30055854844fd416b06bf81dc177ff0ec91e
                                                                      • Opcode Fuzzy Hash: 187f2d647a2aa6bdef5957d3c5cb0c06ae32490c230674121bba88506eead7d0
                                                                      • Instruction Fuzzy Hash: 6E71A1A2B2865A8AFB10DB61D8806FD23E0AF44754F984135EE0DE76D5EF3CE55AC300
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Close_cwprintf_s_l
                                                                      • String ID: Failed to format key string.$Failed to format value string.$Failed to open registry key. Key = '%ls'$Failed to query registry key value.$Failed to set variable.$Registry key not found. Key = '%ls'$Registry value not found. Key = '%ls', Value = '%ls'$RegistrySearchExists failed: ID '%ls', HRESULT 0x%x$d:\a\wix4\wix4\src\burn\engine\search.cpp
                                                                      • API String ID: 3644356412-2242727714
                                                                      • Opcode ID: 29ad6b5602f5371610da6b0835629b60f86eda80cb6b86facaa4e8813f31b358
                                                                      • Instruction ID: 3e436c6d12ed1ed405f5cd7aedbe11b3ee16f68bd9703b59629caaea10d3b13a
                                                                      • Opcode Fuzzy Hash: 29ad6b5602f5371610da6b0835629b60f86eda80cb6b86facaa4e8813f31b358
                                                                      • Instruction Fuzzy Hash: 8E51C6A2B1861A87FB618F65D4407BA23A0FF54798F580135EE0DE7B95DF3DE5198300
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Window$LongProc$MessageObjectPostSelect$CompatibleCreateDeleteQuitStretch
                                                                      • String ID:
                                                                      • API String ID: 79061458-3916222277
                                                                      • Opcode ID: 832407ac416ec40dc60261662f06be782c85584cd33cb5f4ecd676e32aa50239
                                                                      • Instruction ID: c789a5670fcb7ebbc15416ebf5bbe0d1651aab6fb4fdd3ce42bb8a458bfc4849
                                                                      • Opcode Fuzzy Hash: 832407ac416ec40dc60261662f06be782c85584cd33cb5f4ecd676e32aa50239
                                                                      • Instruction Fuzzy Hash: A05190B261868986E724CB23E45477DB2E1FB89BD1F184030DA4EE7B94CE3CF6498704
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CompareCriticalSectionString$EnterLeave
                                                                      • String ID: Failed to combine last source with relative.$Failed to combine last source with source.$Failed to combine layout source with relative.$Failed to combine layout source with source.$Failed to combine source process folder with relative.$Failed to combine source process folder with source.$Failed to copy absolute source path.$Failed to ensure size for search paths array.$WixBundleLastUsedSource$WixBundleOriginalSourceFolder$d:\a\wix4\wix4\src\burn\engine\cache.cpp
                                                                      • API String ID: 1408779843-2177830281
                                                                      • Opcode ID: 50afd28073c7d12655ca60b0b79f20bc5bc21bb199d6a4a9641eec6aef61f1ee
                                                                      • Instruction ID: 0216462a47f74090c2f14ddff5e5a7565540275753110af76b40c2c2182bf947
                                                                      • Opcode Fuzzy Hash: 50afd28073c7d12655ca60b0b79f20bc5bc21bb199d6a4a9641eec6aef61f1ee
                                                                      • Instruction Fuzzy Hash: 11E15DB6B08A5A86EB508F59D4407B927E5EB88B88F084131EE0DE3B95DF3DE549C740
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorEventLast
                                                                      • String ID: BA aborted cache.$Cache prepare package failed: %ls$Cancel during cache: %ls$Failed cache action: %ls$Failed to allocate cache search paths array.$Failed to ensure acquisition folder.$Failed to set syncpoint event.$cache package$d:\a\wix4\wix4\src\burn\engine\apply.cpp$layout bundle$layout container
                                                                      • API String ID: 3848097054-2210361204
                                                                      • Opcode ID: 48bd5f94b7416d4acb779ffc6af4d9cb540e77bbbecd48b5c8b0ed52cc3f5611
                                                                      • Instruction ID: d1be36e6b5e2a3940179aaa4f1864bad08924b899a88fed734c7ba363c1d931e
                                                                      • Opcode Fuzzy Hash: 48bd5f94b7416d4acb779ffc6af4d9cb540e77bbbecd48b5c8b0ed52cc3f5611
                                                                      • Instruction Fuzzy Hash: 2AD1CFB2B18B4A96EB20DF65D4403B963E8FB48794F484235EA4DE7B94DF3CE5198340
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: HeapProcess
                                                                      • String ID: Failed to allocate memory for update bundle payload hash.$Failed to allocate space for burn payload group inside of update bundle struct$Failed to allocate space for burn payload inside of update bundle struct$Failed to copy cache id for update bundle.$Failed to copy download source for pseudo bundle.$Failed to copy filename for pseudo bundle.$Failed to copy id for update bundle.$Failed to copy install arguments for update bundle package$Failed to copy key for pseudo bundle payload.$Failed to copy local source path for pseudo bundle.$Failed to decode hash string: %ls.$d:\a\wix4\wix4\src\burn\engine\pseudobundle.cpp
                                                                      • API String ID: 54951025-2400517205
                                                                      • Opcode ID: f4c70797388e1c26654dd289a022ddbdc26eba78fa03ac0cd7b0b59a47838884
                                                                      • Instruction ID: db958abbf8564e85584ec1c71f935677a9268427b2c8dd499a857301d24f3201
                                                                      • Opcode Fuzzy Hash: f4c70797388e1c26654dd289a022ddbdc26eba78fa03ac0cd7b0b59a47838884
                                                                      • Instruction Fuzzy Hash: 8A91C1A6B18B5A96EB20DB25D4407AA63E4FF94780F8C4035DA4CE7B85EF3DE419C704
                                                                      APIs
                                                                        • Part of subcall function 00007FF6570F6D00: FindResourceExA.KERNEL32(?,?,?,00000000,?,00007FF6570B567B), ref: 00007FF6570F6D2C
                                                                        • Part of subcall function 00007FF6570F6D00: GetLastError.KERNEL32(?,?,?,00000000,?,00007FF6570B567B), ref: 00007FF6570F6D3A
                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6570895BE), ref: 00007FF6570B5837
                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6570895BE), ref: 00007FF6570B584B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CloseHandle$ErrorFindLastResource
                                                                      • String ID: Failed to create UI thread.$Failed to create modal event.$Failed to load splash screen configuration.$Failed to read splash screen configuration resource.$Invalid splash screen type: %i$d:\a\wix4\wix4\src\burn\engine\splashscreen.cpp
                                                                      • API String ID: 3960716503-2387003162
                                                                      • Opcode ID: eef3b4784ad176635c7450cb56cde701eb778f9798600e25abe709cbcf020ecf
                                                                      • Instruction ID: 6c1d4c284156155fcce5e59754327c69a405f0e55c74f554bd1c41e1950376ad
                                                                      • Opcode Fuzzy Hash: eef3b4784ad176635c7450cb56cde701eb778f9798600e25abe709cbcf020ecf
                                                                      • Instruction Fuzzy Hash: 74518C72B18B068AE721CB61E4806A933A0BB48B54F58413ADE0DE7A54EF3CE609C744
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CompareString
                                                                      • String ID: Failed to execute compatible MSI package.$Failed to find package: %ls$Failed to read MSI compatible package id.$Failed to read MSI package id.$Failed to read package log.$Failed to read parent hwnd.$Failed to read rollback flag.$Failed to read variables.$Package '%ls' has no compatible MSI package$Package '%ls' has no compatible package with id: %ls$d:\a\wix4\wix4\src\burn\engine\elevation.cpp
                                                                      • API String ID: 1825529933-1833463798
                                                                      • Opcode ID: a27d66401713bda8bf28be7e86ff31dcf13b59ae075febbd50bb7e6103b5fc43
                                                                      • Instruction ID: 168a893ff1aeb75584f3e6ada817762c3ce52d54139001856021268cb7cf3931
                                                                      • Opcode Fuzzy Hash: a27d66401713bda8bf28be7e86ff31dcf13b59ae075febbd50bb7e6103b5fc43
                                                                      • Instruction Fuzzy Hash: 65A11D75B18B4A85EB10CBA1E4401ED73A5EB98788F580136DE4DE7B58DF3CE60AC740
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CloseHandle$IdleInputProcessWait
                                                                      • String ID: %ls %ls$-uninstall$Bootstrapper application aborted during package process progress.$Bootstrapper application cancelled during package process progress, exit code: 0x%x$Failed to CreateProcess on path: %ls$Failed to append user args.$Failed to wait for executable to complete: %ls$d:\a\wix4\wix4\src\burn\engine\exeengine.cpp
                                                                      • API String ID: 3027418115-16237877
                                                                      • Opcode ID: 59eb1e3af77083b61bdb6fabd72db6877963720825c925e9095edf21414a70c0
                                                                      • Instruction ID: f28ead3b8b724ef2495c41f9648bf673703a322c40552a40281e28d0c725688c
                                                                      • Opcode Fuzzy Hash: 59eb1e3af77083b61bdb6fabd72db6877963720825c925e9095edf21414a70c0
                                                                      • Instruction Fuzzy Hash: 0C915B62B187668AFB10CF61E8807AD67A1BB48788F580139DE0DE7B58CF3DE549C744
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Close$DeleteErrorFileHandleLast_cwprintf_s_l
                                                                      • String ID: Burn$DownloadTimeout$Failed to copy download source URL.$Failed to download URL: %ls$Failed to open internet session$Ignoring failure to get size and time for URL: %ls (error 0x%x)$WiX\Burn$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\dlutil.cpp
                                                                      • API String ID: 2949519566-1623104175
                                                                      • Opcode ID: bc969973fe9c3fc173172cce4f59c2ebfeba3061d2cff27dd6e383ad2b862cdd
                                                                      • Instruction ID: 8316ce9870654d604d729a98c8d070b95f716615e80ecca64ecf72e3b215dcd6
                                                                      • Opcode Fuzzy Hash: bc969973fe9c3fc173172cce4f59c2ebfeba3061d2cff27dd6e383ad2b862cdd
                                                                      • Instruction Fuzzy Hash: 21818376B19B4699EB50CF61E8806A933A4FB44B98F480236DE4DE3B94EF3CD119C704
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CompareString$HeapProcess
                                                                      • String ID: Failed to allocate default application id.$Failed to allocate default application type.$Failed to allocate memory for update entries.$Failed to process ATOM entry.$Failed to reallocate memory for update entries.$application$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\apuputil.cpp$http://appsyndication.org/2006/appsyn$type
                                                                      • API String ID: 3319327951-2947066191
                                                                      • Opcode ID: 9150c8f1d9744b579bb6dbf197083b280d58b265ea9f14b654602577527d328a
                                                                      • Instruction ID: 7d65ffe77739708e1148094b548615e165a0a567cb5347ad9ca464f585be65bd
                                                                      • Opcode Fuzzy Hash: 9150c8f1d9744b579bb6dbf197083b280d58b265ea9f14b654602577527d328a
                                                                      • Instruction Fuzzy Hash: 3A7114B2A18B4682EB24CF25E84126A73E0FB84B64F4C0135DA4DE7794DF3CE549C748
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLastWindow$BitmapCreateCursorLoadObject
                                                                      • String ID: Failed to create window.$Failed to load splash screen bitmap.$WixBurnSplashScreen$`$d:\a\wix4\wix4\src\burn\engine\splashscreen.cpp
                                                                      • API String ID: 1087062382-1433972835
                                                                      • Opcode ID: dfc708886f56aea22527c6216f631cc815af518f0d3ac935a27bb6e05fddeadd
                                                                      • Instruction ID: 7cb5e34116d522d1c19d699679794a0c386022aa0bb8c58c019fdabfd57ca1d7
                                                                      • Opcode Fuzzy Hash: dfc708886f56aea22527c6216f631cc815af518f0d3ac935a27bb6e05fddeadd
                                                                      • Instruction Fuzzy Hash: 8E6158B2A14A468AE720CF26E44076977E5FB98B98F094135DE4DD7758DF3CE409CB80
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CloseCreateErrorFileHandleLast
                                                                      • String ID: %ls payload from working path '%ls' to path '%ls'$Copying$Failed to open payload in working path: %ls$Failed to verify payload hash: %ls$Failed to verify payload signature: %ls$Moving$Payload has no verification information: %ls$d:\a\wix4\wix4\src\burn\engine\cache.cpp
                                                                      • API String ID: 2528220319-3234199796
                                                                      • Opcode ID: bc962a4dadd807e5149b15bfc77bdcc38d20df1e56e90874a1565f108e270ddf
                                                                      • Instruction ID: 54de27d7eb8978814b85496bb711ab4b039624d24b12d94552cebbccfc37d639
                                                                      • Opcode Fuzzy Hash: bc962a4dadd807e5149b15bfc77bdcc38d20df1e56e90874a1565f108e270ddf
                                                                      • Instruction Fuzzy Hash: 0C519E75718B8586E7208F16E48066AB7A4FB88B90F580239DE9DE3B54CF3DD525CB04
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLastToken$InformationProcess$CloseHandleHeapOpen
                                                                      • String ID: Failed to allocate token information.$Failed to get information from process token size.$Failed to get information from process token.$Failed to open process token.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\procutil.cpp
                                                                      • API String ID: 1402880313-3612203842
                                                                      • Opcode ID: 93654e2996a761eb325c3759a878e80e0c52e1a5a3f9df58c6843972dfc6fca6
                                                                      • Instruction ID: 00f2bbac0ecf79cf6d985220700e1d529d7d9cd1d019a53666c9943e1c3d494e
                                                                      • Opcode Fuzzy Hash: 93654e2996a761eb325c3759a878e80e0c52e1a5a3f9df58c6843972dfc6fca6
                                                                      • Instruction Fuzzy Hash: 3851B571B1874A8AEB219F66D88066A33E4BF84B50F4C0135DA4DE3754DF7CE549C744
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Monitor$CapsCreateDeviceFromHeapInfoPointProcessRelease
                                                                      • String ID: DISPLAY$Failed to allocate memory for DpiuMonitorContext.$Failed to get DPI for monitor.$Failed to get device context for monitor.$Failed to get monitor from point.$Failed to get monitor info for point.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\dpiutil.cpp
                                                                      • API String ID: 1183624408-1129088005
                                                                      • Opcode ID: 10dc910972e96ef09c9ba99fa8a9eb434e102d713b5bc66631448ba17b01cfa0
                                                                      • Instruction ID: 8f780da479323cbc32e33f93c92aaf40186edf4b3171ed19c49af97cebcdfbd7
                                                                      • Opcode Fuzzy Hash: 10dc910972e96ef09c9ba99fa8a9eb434e102d713b5bc66631448ba17b01cfa0
                                                                      • Instruction Fuzzy Hash: EE4180B2A08A5E86EB609F16E8001A963E1EB88B90F9D4135DD4DF7754DF3CF509C744
                                                                      APIs
                                                                      • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,00000000,?,?,?,?,?,?,00007FF6570ACF05), ref: 00007FF65708C12A
                                                                      • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,00000000,?,?,?,?,?,?,00007FF6570ACF05), ref: 00007FF65708C3EF
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalSection$EnterLeave
                                                                      • String ID: Failed to parse variable value as version.$Failed to read variable count.$Failed to read variable included flag.$Failed to read variable name.$Failed to read variable value as number.$Failed to read variable value as string.$Failed to read variable value type.$Failed to set variable value.$Failed to set variable.$Unsupported variable type.$d:\a\wix4\wix4\src\burn\engine\variable.cpp
                                                                      • API String ID: 3168844106-1722372363
                                                                      • Opcode ID: fc220c59e7a825faf336270e60be5240594e5b21ebaeed931df62eddd12faee0
                                                                      • Instruction ID: 1992502794f46f74cca7511a63bed6a9aeb112632fd80389bf66432404bbaee6
                                                                      • Opcode Fuzzy Hash: fc220c59e7a825faf336270e60be5240594e5b21ebaeed931df62eddd12faee0
                                                                      • Instruction Fuzzy Hash: 2B9145A1B08A5B9AFB11DBA1D8505BE27F4AB44798F584036DE0DF3B95DF38E6498300
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFileLast$CloseCreateHandleRead
                                                                      • String ID: %ls.R$Failed to calculate resume path from working path: %ls$Failed to create resume file: %ls$Failed to create resume path.$Failed to read resume file: %ls$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\dlutil.cpp
                                                                      • API String ID: 3160720760-2159331624
                                                                      • Opcode ID: b0fb9219233507b50343dbf3de6941200a1d9370cb0aa56eb109785e7af19bf2
                                                                      • Instruction ID: e8c574ffa31eeca42ac8ff17db847c4daa35ffa558ae239060a61741b76bbce3
                                                                      • Opcode Fuzzy Hash: b0fb9219233507b50343dbf3de6941200a1d9370cb0aa56eb109785e7af19bf2
                                                                      • Instruction Fuzzy Hash: F351D4B2B1875587E720CB26E8803AA62D0BB88BA4F484335DE9DD7BD4DF3CD5498744
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: FreeString$HeapProcess
                                                                      • String ID: Failed to allocate ATOM unknown attribute name.$Failed to allocate ATOM unknown attribute namespace.$Failed to allocate ATOM unknown attribute value.$Failed to allocate unknown attribute.$Failed to get unknown attribute name.$Failed to get unknown attribute namespace.$Failed to get unknown attribute value.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\atomutil.cpp
                                                                      • API String ID: 3485037438-797782994
                                                                      • Opcode ID: f168fd8ff74354931a518d3b75d61f3c9652a41daeb371851fc4319f3d88320f
                                                                      • Instruction ID: 7a50ef78f313d5dc6aeda1da22e0c003602cc1409f107436e3188f563c12e1f9
                                                                      • Opcode Fuzzy Hash: f168fd8ff74354931a518d3b75d61f3c9652a41daeb371851fc4319f3d88320f
                                                                      • Instruction Fuzzy Hash: 8A516EA5B09B5B96EB11DB26D89017923E0EF44B84F5C4431DE0DE3BA5EF3CE4498708
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CloseCreateErrorFileHandleLast
                                                                      • String ID: %ls container from working path '%ls' to path '%ls'$Container has no verification information: %ls$Copying$Failed to open container in working path: %ls$Failed to verify container hash: %ls$Moving$d:\a\wix4\wix4\src\burn\engine\cache.cpp
                                                                      • API String ID: 2528220319-3503443624
                                                                      • Opcode ID: 6d36b78f0c8ae030741ba7b745dbf87065d0aa8a2297b58738bfd2dcb2ad118d
                                                                      • Instruction ID: fd80e9c08177d8b0bb71ad1419e7322cd81ea0ca144121bc5ff8003086538e22
                                                                      • Opcode Fuzzy Hash: 6d36b78f0c8ae030741ba7b745dbf87065d0aa8a2297b58738bfd2dcb2ad118d
                                                                      • Instruction Fuzzy Hash: D9519D76718B4586E7208F12E4806AA77E4FB88B90F580239EE8DD7B54CF3CD569CB44
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Failed to allocate space for temp path.$Failed to get max length of input buffer.$Failed to get temp path.$Failed to load kernel32.dll$Failed to reallocate space for temp path.$GetTempPath2W$GetTempPathW results never converged.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\pathutil.cpp$kernel32.dll
                                                                      • API String ID: 0-945536007
                                                                      • Opcode ID: 6023d17c7a8d3e20830b6077d138ec7580dcfbfabcf0b0b2ff7cf487654748f8
                                                                      • Instruction ID: 5f2510348478276e0afe24ad2fc029940ce08578ca9f755fea60726dc220ffb4
                                                                      • Opcode Fuzzy Hash: 6023d17c7a8d3e20830b6077d138ec7580dcfbfabcf0b0b2ff7cf487654748f8
                                                                      • Instruction Fuzzy Hash: 2E41C3A1B18A4B86FF11CF25D88027A62D5AF84790F5D4135DD0DE33A2EE3CE959C304
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: AddressErrorFreeLastLocalProc
                                                                      • String ID: Failed to canonicalize: %ls$Failed to copy the canonicalized path.$Failed to get address of PathAllocCanonicalize.$Failed to initialize path2utl.$Failed to load api-ms-win-core-path-l1-1-0.dll$PathAllocCanonicalize$api-ms-win-core-path-l1-1-0.dll$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\path2utl.cpp
                                                                      • API String ID: 3612902539-1745691185
                                                                      • Opcode ID: 5020280c84d4ef95f29fdd2211bc33ec566e1588389ba0ff39993e04a38af019
                                                                      • Instruction ID: a437816af5f1b0efa266e3926992cf3447563c8b6a97d149769d0575aff41d75
                                                                      • Opcode Fuzzy Hash: 5020280c84d4ef95f29fdd2211bc33ec566e1588389ba0ff39993e04a38af019
                                                                      • Instruction Fuzzy Hash: 4851ADA1B0CB4A85FB209B16E88067A62E0BF48784F9C0135DE4DE7760DF3DE549C718
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: DirectoryErrorLastSystemWindows
                                                                      • String ID: Failed to alloc Windows directory path.$Failed to concat subdirectory on Windows directory path.$Failed to get Windows directory path with default size.$Failed to get Windows directory path with returned size.$Failed to realloc Windows directory path.$Failed to terminate Windows directory path with backslash.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\path2utl.cpp
                                                                      • API String ID: 505562763-519864416
                                                                      • Opcode ID: 5b5ffd5b08da59444f2a6b08d79f3b2db3cafcd67f267dada83fb5041b079584
                                                                      • Instruction ID: 2cb40ffa39aa316143fc6cb1432640affd313e40e7ddd163816c5e6cb4518fd5
                                                                      • Opcode Fuzzy Hash: 5b5ffd5b08da59444f2a6b08d79f3b2db3cafcd67f267dada83fb5041b079584
                                                                      • Instruction Fuzzy Hash: 2041A361B18B4686FB119B55E89037A63D4AFC4B90F5C0031DE4DE7795EFBCE9098B08
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Sleep$ErrorLastWindow$CloseCriticalCurrentEnterHandleLookupPrivilegeProcessSectionValue
                                                                      • String ID: Failed to enable shutdown privilege in process token.$Failed to schedule restart.$SeShutdownPrivilege$d:\a\wix4\wix4\src\burn\engine\engine.cpp
                                                                      • API String ID: 1619525766-2157809017
                                                                      • Opcode ID: 8335a0d5f0e8bbece7f30233b55d3bfe093975e3dcf69f64dd79098857f69502
                                                                      • Instruction ID: ba21421657195aca565ad7ff521654dffeaf3dc4c0b354b69963c0e6401903ab
                                                                      • Opcode Fuzzy Hash: 8335a0d5f0e8bbece7f30233b55d3bfe093975e3dcf69f64dd79098857f69502
                                                                      • Instruction Fuzzy Hash: 6B41CBA1B18A8B83F7249B65E89037A62D1EF84B94F5C4035DA0DE77D4DF6CF85A8304
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalSection$EnterLeave
                                                                      • String ID: Failed to get numeric.$Failed to get string.$Failed to write included flag.$Failed to write variable count.$Failed to write variable name.$Failed to write variable value as number.$Failed to write variable value as string.$Failed to write variable value type.$Unsupported variable type.$d:\a\wix4\wix4\src\burn\engine\variable.cpp
                                                                      • API String ID: 3168844106-3226335872
                                                                      • Opcode ID: 2f9ff8235a1512951770a9d4813028bbf8c285329225a902fa43203456165b82
                                                                      • Instruction ID: 6a7528ec0a315b7e881657b911f53ba8928df4a2f6ca158b4d208ba4169247de
                                                                      • Opcode Fuzzy Hash: 2f9ff8235a1512951770a9d4813028bbf8c285329225a902fa43203456165b82
                                                                      • Instruction Fuzzy Hash: AC6190A1B0C61B93EA24DB21D44427A23D4FB48B90FA84235DE0DEB795DF3DE91AC700
                                                                      APIs
                                                                      • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF6570F5849), ref: 00007FF6570EA01E
                                                                      • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF6570F5849), ref: 00007FF6570EA192
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Close
                                                                      • String ID: Failed to concatenate paths while recursively deleting subkeys. Path1: %ls, Path2: %ls$Failed to delete registry key (ex).$Failed to delete registry key.$Failed to enumerate key 0$Failed to open this key for enumerating subkeys: %ls$Failed to recursively delete subkey: %ls$RegInitialize must be called first in order to RegDelete() a key with non-default bit attributes!$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\regutil.cpp
                                                                      • API String ID: 3535843008-329788176
                                                                      • Opcode ID: 3fff0434b7efc1b17b30b79050bafae5a9a5e502ac803cf16d9c882809d36b86
                                                                      • Instruction ID: 7ccfd75a4ed1bfe6cb43c2ddf8ffac372e6510e8abdb8f0865edf1d0334c2b62
                                                                      • Opcode Fuzzy Hash: 3fff0434b7efc1b17b30b79050bafae5a9a5e502ac803cf16d9c882809d36b86
                                                                      • Instruction Fuzzy Hash: 88817EB1B1872B89FB209B66D88067A23E4BB49B80F580536DE0DE3B54DF3DE5498740
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Variant$AllocClearInitString
                                                                      • String ID: d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\xmlutil.cpp$failed XmlCreateDocument$failed put_preserveWhiteSpace$failed put_resolveExternals$failed put_validateOnParse$failed to allocate bstr for Path in XmlLoadDocumentFromFileEx$failed to load XML from: %ls
                                                                      • API String ID: 2213243845-3558707546
                                                                      • Opcode ID: 594f55ff40f7e68af164e6c62440e0f63f53b8e968095b48d2a03afd17150360
                                                                      • Instruction ID: 5ad9855023bf29f67419d466d2e6445fc9ccd05c7187bd2d6cf862846da16f2a
                                                                      • Opcode Fuzzy Hash: 594f55ff40f7e68af164e6c62440e0f63f53b8e968095b48d2a03afd17150360
                                                                      • Instruction Fuzzy Hash: 48715DB6B18B4A96EB118F66D8801AD33A5EF48B94F484136CE0DE3764EF3DE549C304
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Close$lstrlen
                                                                      • String ID: %ls\%ls$Failed to allocate dependent subkey "%ls" under dependency "%ls".$Failed to allocate the registry key for dependency "%ls".$Failed to create the dependency registry key "%ls".$Failed to create the dependency subkey "%ls".$Failed to set the %ls registry value to "%ls".$Failed to set the %ls registry value to %d.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\deputil.cpp
                                                                      • API String ID: 1752758355-602586573
                                                                      • Opcode ID: 95099f63415e8c6dfb790fd428379e41e8111bcca93647b5c6b3bb41871ddc1c
                                                                      • Instruction ID: 1d5d806a88ec2a1258dfd646ac6cf47bf2be1153cfa9251eb52ab93f51ed50bf
                                                                      • Opcode Fuzzy Hash: 95099f63415e8c6dfb790fd428379e41e8111bcca93647b5c6b3bb41871ddc1c
                                                                      • Instruction Fuzzy Hash: BA713C72B28B5A85EB10CB52E8807A937B4FB48794F080535EE4DE7B69DF3CD5488744
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: EnvironmentErrorExpandLastStrings
                                                                      • String ID: Failed to allocate buffer for expanded string.$Failed to allocate space for expanded path.$Failed to expand environment variables in string: %ls$Failed to get max length of input buffer.$Failed to re-allocate more space for expanded path.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\envutil.cpp
                                                                      • API String ID: 4064601616-3610958334
                                                                      • Opcode ID: f9daa8191f49c94f3b76de57b8307bcb9f76794c0b0d5332c6eee05878274ed4
                                                                      • Instruction ID: 3c135735ac46e8629444a74fb7d442c234af9ed0f984d7f32429c5150c60fa91
                                                                      • Opcode Fuzzy Hash: f9daa8191f49c94f3b76de57b8307bcb9f76794c0b0d5332c6eee05878274ed4
                                                                      • Instruction Fuzzy Hash: C04107A1B08B06C6EB21DB66D84027923D1AF84BD0F5C5136DE0DE7795EE3CE909C704
                                                                      APIs
                                                                        • Part of subcall function 00007FF6570EA674: RegOpenKeyExW.KERNELBASE(?,?,?,?,?,?,00000000,00007FF6570EA66D), ref: 00007FF6570EA6C1
                                                                      • RegCloseKey.ADVAPI32 ref: 00007FF65708A996
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CloseOpen
                                                                      • String ID: CommonFilesDir$Failed to ensure path was backslash terminated.$Failed to get 64-bit folder.$Failed to open Windows folder key.$Failed to read folder path for '%ls'.$Failed to set variant value.$ProgramFilesDir$SOFTWARE\Microsoft\Windows\CurrentVersion$d:\a\wix4\wix4\src\burn\engine\variable.cpp
                                                                      • API String ID: 47109696-3026353617
                                                                      • Opcode ID: 0c85f6d079ce6b1e861ce7baa1f194e72584532c41f66755beed974e70b7b8e1
                                                                      • Instruction ID: f9d6eaff57f69b91d5625801e48eadde03c5f49c5f425c0a6459202f998dd9bd
                                                                      • Opcode Fuzzy Hash: 0c85f6d079ce6b1e861ce7baa1f194e72584532c41f66755beed974e70b7b8e1
                                                                      • Instruction Fuzzy Hash: 1F41D3A2B1CA5A82FB20DB16E88077963D4FB49784F994135DE8CE3B95DF3CE5498700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: FreeString
                                                                      • String ID: Failed to query IXMLDOMParseError.errorCode.$Failed to query IXMLDOMParseError.filepos.$Failed to query IXMLDOMParseError.line.$Failed to query IXMLDOMParseError.linepos.$Failed to query IXMLDOMParseError.reason.$Failed to query IXMLDOMParseError.srcText .$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\xmlutil.cpp
                                                                      • API String ID: 3341692771-2297621156
                                                                      • Opcode ID: 4512603ddfcaf43032c64b985e8020668fc5d61bff97e75c2df6c7617902b3ed
                                                                      • Instruction ID: ad62e0117263d759a99b182f001f2721fb66f18b6970b6017be5a0e36dfa4b82
                                                                      • Opcode Fuzzy Hash: 4512603ddfcaf43032c64b985e8020668fc5d61bff97e75c2df6c7617902b3ed
                                                                      • Instruction Fuzzy Hash: E741EBA6B08A4F85FB108F26D8943B923A0FB54F88F4C4432DD0EE66A4DF6DE559C744
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: AddressErrorHandleLastModuleProc
                                                                      • String ID: DllGetVersion$Failed to create msi.dll version from QWORD.$Failed to find DllGetVersion entry point in msi.dll.$Failed to get msi.dll version info.$Failed to set variant value.$d:\a\wix4\wix4\src\burn\engine\variable.cpp$msi
                                                                      • API String ID: 4275029093-1657635385
                                                                      • Opcode ID: 021f52ab083eb0e9da1a4df6df46773c030ff95cca2067d7327bc12b7904757e
                                                                      • Instruction ID: 95aa52fb97aa6f8f5b8c329de6aef78970530ccae21c1c49805b32f067a99b5b
                                                                      • Opcode Fuzzy Hash: 021f52ab083eb0e9da1a4df6df46773c030ff95cca2067d7327bc12b7904757e
                                                                      • Instruction Fuzzy Hash: B0319361B18B4A86FB14DB15E88027A32E0BF48B80F580139EA4EE7755EF7CE55AC744
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Event$CriticalSection$CloseEnterErrorLastLeaveOpenReport
                                                                      • String ID: Application$Failed to open Application event log$Setup$_Failed$d:\a\wix4\wix4\src\burn\engine\logging.cpp$log
                                                                      • API String ID: 1844635321-122217184
                                                                      • Opcode ID: 4b85589f99975c1b976fe861e3be25becbb4e57052186f6c808d00d94f6357fa
                                                                      • Instruction ID: 2940765654e4da75a47974d16c68059bbf2e896b0c3a1438d8efb443cc5b1dca
                                                                      • Opcode Fuzzy Hash: 4b85589f99975c1b976fe861e3be25becbb4e57052186f6c808d00d94f6357fa
                                                                      • Instruction Fuzzy Hash: 4D21B3B1B2874683EB209B20E8407B532E4FF58755F4C0139D94EE6664DF7CE158C744
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Failed to canonicalize the directory.$Failed to canonicalize the path.$Failed to get length of canonicalized directory.$Failed to get length of canonicalized path.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\path2utl.cpp$wzDirectory is required.$wzDirectory must be a fully qualified path.$wzPath is required.
                                                                      • API String ID: 0-3471778437
                                                                      • Opcode ID: db76efad90147d71d36b0b8f27363ce663af105e838ddee49edf050a43f618dd
                                                                      • Instruction ID: 3211916e10f4bd7b115fe122573fe760fc3ec358db0422f28384d20c3d65be61
                                                                      • Opcode Fuzzy Hash: db76efad90147d71d36b0b8f27363ce663af105e838ddee49edf050a43f618dd
                                                                      • Instruction Fuzzy Hash: 6F6115A2B2874AC6EB60CF51DC8017922E4BF84794F5C4635D90DE7B98DF3CE4198B08
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Expected fully qualified path provided to prefix: %ls.$Failed to add prefix to UNC path.$Failed to add prefix to file path.$Failed to get length of path to prefix.$Failed to get size of full path.$\\?\$\\?\UNC$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\pathutil.cpp
                                                                      • API String ID: 0-3583157011
                                                                      • Opcode ID: a12aa26839a8212efae9c4ff9b64cb91badb033cfe9af1d7552efa41baf5d959
                                                                      • Instruction ID: 4669d519cf574b7fb21c9ff8c0574d1ccf7ecc21578936fab69ebd7f929527ff
                                                                      • Opcode Fuzzy Hash: a12aa26839a8212efae9c4ff9b64cb91badb033cfe9af1d7552efa41baf5d959
                                                                      • Instruction Fuzzy Hash: CF51CEA1B0875AC6FB218F61E8402B923E4AF44790F5D4236D90DE7B9ADF3CE959C700
                                                                      APIs
                                                                      • GetFullPathNameW.KERNEL32(?,?,?,00000000,?,?,?,00007FF657085161), ref: 00007FF657085799
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: FullNamePath
                                                                      • String ID: Failed to allocate space for full path.$Failed to get current directory.$Failed to get full path for string: %ls$Failed to get max length of input buffer.$Failed to reallocate space for full path.$GetFullPathNameW results never converged.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\pathutil.cpp
                                                                      • API String ID: 608056474-2352071517
                                                                      • Opcode ID: 57833038a21a912b398dccbe3f71b7d3b3023ad11398f9ea11995bfab75e28fd
                                                                      • Instruction ID: 22acebc411b6a436044ed3944ef4000b6c4fa7720dc5cc3daadd712102e1c095
                                                                      • Opcode Fuzzy Hash: 57833038a21a912b398dccbe3f71b7d3b3023ad11398f9ea11995bfab75e28fd
                                                                      • Instruction Fuzzy Hash: 8D51F2A1B0874AC6FB21CB66E85027A23D1BF84B90F5C4036DD0DE7795EE3CE95A8340
                                                                      APIs
                                                                      • CreateEventW.KERNEL32(?,?,00000000,?,00000000,00007FF6570C46A7,?,?,?,?,00000000,00007FF6570C7037,?,?,?,?), ref: 00007FF6570C4737
                                                                      • GetLastError.KERNEL32(?,?,00000000,?,00000000,00007FF6570C46A7,?,?,?,?,00000000,00007FF6570C7037,?,?,?,?), ref: 00007FF6570C4749
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CreateErrorEventLast
                                                                      • String ID: Failed to append cache action.$Failed to append checkpoint before package start action.$Failed to append rollback cache action.$Failed to create syncpoint event.$Failed to plan cache for package.$Failed to plan package cache syncpoint$d:\a\wix4\wix4\src\burn\engine\plan.cpp
                                                                      • API String ID: 545576003-3436273000
                                                                      • Opcode ID: d0914f86cee8b0ec2ced260528ddd7a6b23984103b3be1bce50e0ea9257c05ec
                                                                      • Instruction ID: d2c2f62557f9f36c7be2221b916907ffb29f7e255527b74cb1fd590f8e4bf01c
                                                                      • Opcode Fuzzy Hash: d0914f86cee8b0ec2ced260528ddd7a6b23984103b3be1bce50e0ea9257c05ec
                                                                      • Instruction Fuzzy Hash: 4D51A0B1B08B8A86FB518B55D580379ABD8FB84791F484036EA0CE7B91EF7CE449C710
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: FreeLocal
                                                                      • String ID: Failed to allocate access for Administrators group to path: %ls$Failed to allocate access for Everyone group to path: %ls$Failed to allocate access for SYSTEM group to path: %ls$Failed to allocate access for Users group to path: %ls$Failed to create ACL to secure cache path: %ls$Failed to secure cache path: %ls$d:\a\wix4\wix4\src\burn\engine\cache.cpp
                                                                      • API String ID: 2826327444-3214910189
                                                                      • Opcode ID: 243e87a999ebd0d1ab40952a327c70c6d0e9f4ee8fde7ec225f2b59d1a11005f
                                                                      • Instruction ID: 406f47e19d46314eb0b044b33448815bf8e87d3812f216c358aa7db5bb681296
                                                                      • Opcode Fuzzy Hash: 243e87a999ebd0d1ab40952a327c70c6d0e9f4ee8fde7ec225f2b59d1a11005f
                                                                      • Instruction Fuzzy Hash: 4D51BDB5B18B5A86FB20CB60D4507AA23E4FB88744F484135DA4DE7B85DF7CE649C780
                                                                      APIs
                                                                      • GetCurrentProcessId.KERNEL32(?,?,?,?,?,00000000,?,00007FF65709EFF0,?,?,?,00000000,?,?,?,00000001), ref: 00007FF65709E65B
                                                                      • ProcessIdToSessionId.KERNEL32(?,?,?,?,?,00000000,?,00007FF65709EFF0,?,?,?,00000000,?,?,?,00000001), ref: 00007FF65709E667
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Process$CurrentSession
                                                                      • String ID: %u\$Failed to copy temp folder.$Failed to format session id as a string.$Failed to get length of session id string.$Failed to get temp folder.$d:\a\wix4\wix4\src\burn\engine\logging.cpp
                                                                      • API String ID: 2701954971-2959569260
                                                                      • Opcode ID: f0ca8641ff3292b95d7a62d5d417d438b0d5bfa7a547b383780b72ba57924fb0
                                                                      • Instruction ID: 4e3cb0da04b3803ea359ad7d8d18d89348ac64e0b81b09a164fa3aaf87596c20
                                                                      • Opcode Fuzzy Hash: f0ca8641ff3292b95d7a62d5d417d438b0d5bfa7a547b383780b72ba57924fb0
                                                                      • Instruction Fuzzy Hash: 3241D1A6B0864A8AFB24DF65D8401B922A5EF547D4F580135EA0DF7B94DE3CE849C300
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: _cwprintf_s_l$ErrorLastName$ComputerFileModule
                                                                      • String ID: --- logging level: %hs ---$=== Logging started: %ls ===$Computer : %ls$Executable: %ls v%d.%d.%d.%d
                                                                      • API String ID: 3251030568-3153207428
                                                                      • Opcode ID: 5ea016fcbd75f4c4ec5900e7a98313e076532851bda2b68c80d65b6df27ed871
                                                                      • Instruction ID: 8cbf756655d73538879fdc07a4291f7cc1bb044d65eeabc803293f161b72141c
                                                                      • Opcode Fuzzy Hash: 5ea016fcbd75f4c4ec5900e7a98313e076532851bda2b68c80d65b6df27ed871
                                                                      • Instruction Fuzzy Hash: 76512BB2A18A4A99EB14DF21D4503BD33A1FB44B48F5C553AEA0DE7A99DF3CE509C700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$AddressLibraryLoadProc
                                                                      • String ID: BootstrapperApplicationCreate$Failed to create BA.$Failed to get BootstrapperApplicationCreate entry-point$Failed to load BA DLL: %ls$d:\a\wix4\wix4\src\burn\engine\userexperience.cpp
                                                                      • API String ID: 1866314245-160439467
                                                                      • Opcode ID: c843d2d23e02fb10cdfc4e40948a9a6eebf659ada020a82c8a8ee113bf63683e
                                                                      • Instruction ID: da66fb90ac00ebd1a4f763b76180a63893ee2a3f16c154589fd9ffbb6ed1a852
                                                                      • Opcode Fuzzy Hash: c843d2d23e02fb10cdfc4e40948a9a6eebf659ada020a82c8a8ee113bf63683e
                                                                      • Instruction Fuzzy Hash: 75416B71B18B158AEB10CB66E8803A933E4BB48B54F584139DA4DE3B94EF3CE569C344
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: AttributesErrorFileLast
                                                                      • String ID: Failed to format variable string.$Failed to set variable.$File search: %ls, did not find path: %ls$File search: %ls, failed get to file attributes. '%ls'$File search: %ls, found directory at path: %ls$d:\a\wix4\wix4\src\burn\engine\search.cpp
                                                                      • API String ID: 1799206407-2753988889
                                                                      • Opcode ID: b903b5c7d56ce00168fbc4cdd80d39e55c29728d0100a10a70a60c26580a0708
                                                                      • Instruction ID: ea8bb528c425b9f4f6d4fce63fd38c411fb4b0f6d5b993e421c7ba331b430fc7
                                                                      • Opcode Fuzzy Hash: b903b5c7d56ce00168fbc4cdd80d39e55c29728d0100a10a70a60c26580a0708
                                                                      • Instruction Fuzzy Hash: 8B41B4B1B18B5A82FB20CB16E880769A3E0EF59BE0F484135DA4DE7B95DF2CE555C700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: AttributesErrorFileLast
                                                                      • String ID: Directory search: %ls, did not find path: %ls$Directory search: %ls, failed get to directory attributes. '%ls'$Directory search: %ls, found file at path: %ls$Failed to format variable string.$Failed to set variable.$d:\a\wix4\wix4\src\burn\engine\search.cpp
                                                                      • API String ID: 1799206407-98901924
                                                                      • Opcode ID: e2287faf52cfcd9a4b05c1ad5e7f6265a16d6bd957921b3355e12b5bd84e01de
                                                                      • Instruction ID: 0248e71f1a0d60c30d1ca9f0a1b9044d712994d81f510637165266c2751ca788
                                                                      • Opcode Fuzzy Hash: e2287faf52cfcd9a4b05c1ad5e7f6265a16d6bd957921b3355e12b5bd84e01de
                                                                      • Instruction Fuzzy Hash: CF41E5B1B18B5A82FB208F16E88076963E0EF58BA0F484135DA4DE3B95DF7CE559C740
                                                                      APIs
                                                                      • GetModuleHandleW.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6570811A9), ref: 00007FF6570814C6
                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6570811A9), ref: 00007FF6570814D4
                                                                      • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6570811A9), ref: 00007FF65708153B
                                                                      • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6570811A9), ref: 00007FF657081552
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: AddressProc$ErrorHandleLastModule
                                                                      • String ID: Failed to get module handle for kernel32.$SetDefaultDllDirectories$SetDllDirectoryW$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\apputil.cpp$kernel32
                                                                      • API String ID: 3392887714-1639946792
                                                                      • Opcode ID: 448f6d6d3fceaf8dddfeef816180ca98639cda4229b9d3adfdb510a3f0b884dc
                                                                      • Instruction ID: f3d6e7eef983d35eef99a2bf8c62defa9ee3b00fca65e92c4deeb5e8292d66f1
                                                                      • Opcode Fuzzy Hash: 448f6d6d3fceaf8dddfeef816180ca98639cda4229b9d3adfdb510a3f0b884dc
                                                                      • Instruction Fuzzy Hash: 5C112BE4B18B4A8AEB118F25E85427423E5BF58740F880139C90EE2364EF7CB25DC748
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $Aborted cache verify payload signature begin.$Failed authenticode verification of payload: %ls$Failed to get provider state from authenticode certificate.$Failed to get signer chain from authenticode certificate.$Failed to verify expected payload against actual certificate chain.$P$d:\a\wix4\wix4\src\burn\engine\cache.cpp
                                                                      • API String ID: 0-3239389295
                                                                      • Opcode ID: 08dd8b6a2373310458455d9377b114611bb2719e7e8e543433c65bcdbe83985d
                                                                      • Instruction ID: 00446a1f4edc018c32fa67cac996cfaae3e08428efa31f861d0dfb2dfbef3534
                                                                      • Opcode Fuzzy Hash: 08dd8b6a2373310458455d9377b114611bb2719e7e8e543433c65bcdbe83985d
                                                                      • Instruction Fuzzy Hash: 4171A1A1B187598AF710CF66E8403AE27E5BB48794F880139DE4DE7B85DF3CD5098B44
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharErrorLastMultiWide
                                                                      • String ID: Not enough memory to allocate string of size: %u$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\strutil.cpp$failed to allocate string, len: %u$failed to convert to unicode: %s$failed to get required size for conversion to unicode: %s$failed to get size of destination string
                                                                      • API String ID: 203985260-642716852
                                                                      • Opcode ID: da3039218adc81f24383304331035bda6c2f6f4b057e17fde15fc0ad0c03ca2e
                                                                      • Instruction ID: 42292db9c8c32814fc6458e9bd10b7d0fdb5280aa9b0deb890f8a8d10fc5ff2b
                                                                      • Opcode Fuzzy Hash: da3039218adc81f24383304331035bda6c2f6f4b057e17fde15fc0ad0c03ca2e
                                                                      • Instruction Fuzzy Hash: 7C61D561B18B4AC6EB20CF15E84066A77E4FB88B94F584235DA8DE3754EF3CE51AC704
                                                                      APIs
                                                                      • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6570B847C), ref: 00007FF6570D1778
                                                                      • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6570B847C), ref: 00007FF6570D1963
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalSection$EnterLeave
                                                                      • String ID: BA did not provide container or payload id.$BA requested unknown container with id: %ls$BA requested unknown payload with id: %ls$Engine is active, cannot change engine state.$Failed to set download URL.$Failed to set download password.$Failed to set download user.$d:\a\wix4\wix4\src\burn\engine\externalengine.cpp
                                                                      • API String ID: 3168844106-103459661
                                                                      • Opcode ID: b9ed0b6623a0e6e4547915c46f82a2eaee7a7dad5ce791c4c77751d412e331ac
                                                                      • Instruction ID: 9c5ba89b97f120dd2db758eed7f874d933417002e37517907e543b9ec339bcf6
                                                                      • Opcode Fuzzy Hash: b9ed0b6623a0e6e4547915c46f82a2eaee7a7dad5ce791c4c77751d412e331ac
                                                                      • Instruction Fuzzy Hash: E4519CA6B28B5B81FB219B11E4406BA63E6EF94B80F5E4031CD4DE7694DF3CE549C305
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CompareString
                                                                      • String ID: Failed to find package: %ls$Failed to read compatible package id.$Failed to read package id.$Failed to remove from cache compatible package: %ls$Package '%ls' has no compatible package to clean.$Package '%ls' has no compatible package with id: %ls$d:\a\wix4\wix4\src\burn\engine\elevation.cpp
                                                                      • API String ID: 1825529933-529956491
                                                                      • Opcode ID: 34399d768df18e0d49aa43e9dfe992324759d8d24ea4854b3b500236194cfebf
                                                                      • Instruction ID: 7dd10f02c569e7e62ec01a99dc8f2d75629dbe24bd7a309aa24501d4c8dc517d
                                                                      • Opcode Fuzzy Hash: 34399d768df18e0d49aa43e9dfe992324759d8d24ea4854b3b500236194cfebf
                                                                      • Instruction Fuzzy Hash: 4361AC72B18B8A85EB208B51E8815AD73E4FB88794F580536DE4CE7B98DF3CE519C740
                                                                      APIs
                                                                      • RegCloseKey.ADVAPI32(00000000,?,00000001,00000000,?,00000000,?,00007FF6570A3FBB), ref: 00007FF6570F6380
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Close
                                                                      • String ID: Failed to compare path from pending file rename to check path.$Failed to open pending file rename registry key.$Failed to read pending file renames.$Failed to update pending file renames.$PendingFileRenameOperations$SYSTEM\CurrentControlSet\Control\Session Manager$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\file2utl.cpp
                                                                      • API String ID: 3535843008-1055086927
                                                                      • Opcode ID: 8a31e4e7bb34dc1cd83b7cf9048de4f798601f10815143cb8e07e02f0481c142
                                                                      • Instruction ID: 746a7561115624982c11cf5ccdd874ae7dae3b46e51f72b7d34766c17bfee6ed
                                                                      • Opcode Fuzzy Hash: 8a31e4e7bb34dc1cd83b7cf9048de4f798601f10815143cb8e07e02f0481c142
                                                                      • Instruction Fuzzy Hash: CC51B0A6B08A4A96EB209F55D8405BD27A5FF44798F1C0132EE0DE3794CF3AE45DC744
                                                                      APIs
                                                                      • RegCloseKey.ADVAPI32(?,00000000,00000000,?,?,?,?,00007FF6570BB964,?,?,?,?,?,?,?,00007FF6570A84DA), ref: 00007FF6570BB851
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Close
                                                                      • String ID: DisplayVersion$Failed to compare versions.$Failed to open registry key: %ls.$Failed to read DisplayVersion.$Failed to read QuietUninstallString.$QuietUninstallString$d:\a\wix4\wix4\src\burn\engine\exeengine.cpp
                                                                      • API String ID: 3535843008-915021512
                                                                      • Opcode ID: ac021f0d4ad47cbd35175f7e37a5cf47a107297fef55f15788c3b23784f1e375
                                                                      • Instruction ID: 972052c00402ae7531e7cf0a4b32b3d1f2b3c7c9c749becc866468897d23c6c8
                                                                      • Opcode Fuzzy Hash: ac021f0d4ad47cbd35175f7e37a5cf47a107297fef55f15788c3b23784f1e375
                                                                      • Instruction Fuzzy Hash: C8516BB2A0864A8AEB20DF55D8806BD23A4FF44798F584135DE1DE7B95DF3DE949C300
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter_noinfo
                                                                      • String ID: Failed to find variable.$Failed to format variable '%ls' for condition '%ls'$Failed to get if variable is hidden.$Failed to parse condition '%ls' at position: %u$Failed to read next symbol.$Failed to store formatted value for variable '%ls' for condition '%ls'$d:\a\wix4\wix4\src\burn\engine\condition.cpp
                                                                      • API String ID: 3215553584-164709811
                                                                      • Opcode ID: 1fdbb18b1e99bb94b29e364002afcf10c44d5f7b1fe3c45bdbae2cbbdf7d2e1a
                                                                      • Instruction ID: 21bd8de660d481984681f12748b27143473b388d4002017f2217a3cf2b8c6551
                                                                      • Opcode Fuzzy Hash: 1fdbb18b1e99bb94b29e364002afcf10c44d5f7b1fe3c45bdbae2cbbdf7d2e1a
                                                                      • Instruction Fuzzy Hash: 2F6173B1B18B5AC2EB109B65D48026A73E0FB48790F484136DA4DE3B96DF3CF569C740
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CompareCriticalSectionString$EnterLeave
                                                                      • String ID: Failed to determine length of relative path.$Failed to determine length of source path.$Failed to set last source.$Failed to trim source folder.$WixBundleLastUsedSource$d:\a\wix4\wix4\src\burn\engine\cache.cpp
                                                                      • API String ID: 1408779843-3313679279
                                                                      • Opcode ID: d80546b3a50a9189c6e3d5ee172a5ebb3de63259478a59f8194fa4c749a4eb7c
                                                                      • Instruction ID: 22d4daf5c7d9adc457b3b7dfd50125dced9228a2c5d3da844daf587cff5af59c
                                                                      • Opcode Fuzzy Hash: d80546b3a50a9189c6e3d5ee172a5ebb3de63259478a59f8194fa4c749a4eb7c
                                                                      • Instruction Fuzzy Hash: DC51D3B1B08B4B82EB208B56E4405BA66D1BF847E0F5C4235D95DFBBA4DF3CE6488700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: _cwprintf_s_l
                                                                      • String ID: Verification failed on container: %ls$Verification failed on payload group item: %ls$Verification failed on payload: %ls$Verification failed on unknown item
                                                                      • API String ID: 2941638530-3108875620
                                                                      • Opcode ID: e5c5d43e2a60a3478df85ace7e2cc9d028fe75ab9ce8f4e41d72fb322722f553
                                                                      • Instruction ID: fb1c3a1e53bdaa161117c842ba2d351931824efa563d84378e84e43be69b28af
                                                                      • Opcode Fuzzy Hash: e5c5d43e2a60a3478df85ace7e2cc9d028fe75ab9ce8f4e41d72fb322722f553
                                                                      • Instruction Fuzzy Hash: 1B4143F290864981EB24AF26D194279B7E4EB45B89F1D4036CB0DEB395CF6DDC48C750
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CloseHandle$CreateErrorLastProcess
                                                                      • String ID: "%ls" %ls$Failed to allocate full command-line.$Failed to create process: %ls$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\procutil.cpp
                                                                      • API String ID: 161867955-574850417
                                                                      • Opcode ID: bf3f04070760b52da87ffb570d4b5bfb6d777464a8717cc438b9f559b0254a56
                                                                      • Instruction ID: 4831e9df036649becf0776b5d7fb668a70874ddd4c14a61910a09a30827262ad
                                                                      • Opcode Fuzzy Hash: bf3f04070760b52da87ffb570d4b5bfb6d777464a8717cc438b9f559b0254a56
                                                                      • Instruction Fuzzy Hash: B3516E72B18B4A8AEB208F61D4807A933E5EB44748F580139DE4DE7A54DF3CD519C744
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CreateErrorLastThread
                                                                      • String ID: Failed to actually elevate.$Failed to cache engine to working directory.$Failed to create unelevated logging thread.$Failed to overwrite the %ls built-in variable.$WixBundleElevated$d:\a\wix4\wix4\src\burn\engine\core.cpp
                                                                      • API String ID: 1689873465-937186276
                                                                      • Opcode ID: 989001d9cd542178439b8a18da00df32baf7a9c0f2142518d3b5cbeeae2207ba
                                                                      • Instruction ID: f42d45de8bd1b84dbe9a539bbdb19e1c9d31dbaeb6ba293cfa5c1704cbcfe77d
                                                                      • Opcode Fuzzy Hash: 989001d9cd542178439b8a18da00df32baf7a9c0f2142518d3b5cbeeae2207ba
                                                                      • Instruction Fuzzy Hash: CA41F3B1B08B5A96EB20CB11E4807AA63D0FB547A4F480235DA5DE3BD4DF7CE659C740
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLastNamePathVolume
                                                                      • String ID: Failed to allocate space for volume path name.$Failed to get max length of input buffer.$Failed to get volume path name of: %ls$Failed to re-allocate more space for volume path name.$Failed to terminate volume path name with backslash.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\pathutil.cpp
                                                                      • API String ID: 836773004-3870598061
                                                                      • Opcode ID: 111ae56f78872d22bdadff5a5081fc48684e45e9a0027fa682dcb12ef0333480
                                                                      • Instruction ID: b350754ad659881747a00a05dd07d8473c5f1856a944bbc80d837e2dc1ece07b
                                                                      • Opcode Fuzzy Hash: 111ae56f78872d22bdadff5a5081fc48684e45e9a0027fa682dcb12ef0333480
                                                                      • Instruction Fuzzy Hash: 4641F9A1B08B4B86FB10DF25D49027A63D0AF84790F5D4135DE0EE7792EE3CE9598744
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: StringVariant$AllocClearFreeInit
                                                                      • String ID: d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\xmlutil.cpp$failed getNamedItem in XmlGetAttribute(%ls)$failed get_attributes$failed get_nodeValue in XmlGetAttribute(%ls)
                                                                      • API String ID: 760788290-1291303398
                                                                      • Opcode ID: 04b908322ec78d3d9644c64800fdb29fe662aa3cdc8df159d978eb656784be6c
                                                                      • Instruction ID: c379bca60de19c49565e4e1347dae61d89d527a9a82ec4e854d3547001d9ea3e
                                                                      • Opcode Fuzzy Hash: 04b908322ec78d3d9644c64800fdb29fe662aa3cdc8df159d978eb656784be6c
                                                                      • Instruction Fuzzy Hash: 8E412166B09B4E95FB508F21E8842A823A0FB58B98F484131DE4DE7768DF3DE54AC344
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: MutexObjectReleaseSingleWait$Event
                                                                      • String ID: Failed to get message from netfx chainer.$Failed to send files in use message from netfx chainer.$d:\a\wix4\wix4\src\burn\engine\netfxchainer.cpp
                                                                      • API String ID: 2608678126-3113603724
                                                                      • Opcode ID: 7360c2685d6a1c5e619b77fc17da6f1d68f25e6ceaba4a394f00c60c14702ca6
                                                                      • Instruction ID: 2a8b9ebcdc8ea6c85582e29b1e3ffa0e5e4d5f70d1a78af226016ca6f8dfc488
                                                                      • Opcode Fuzzy Hash: 7360c2685d6a1c5e619b77fc17da6f1d68f25e6ceaba4a394f00c60c14702ca6
                                                                      • Instruction Fuzzy Hash: 0F41B2B2A04A4586EB109B66D8507B967A0FB44B98F084135DE4EE7B95CF3CE189C704
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: AttributesErrorFileLast
                                                                      • String ID: Directory search: %ls, did not find path: %ls, reason: 0x%x$Failed to format variable string.$Failed to set directory search path variable.$Failed while searching directory search: %ls, for path: %ls$d:\a\wix4\wix4\src\burn\engine\search.cpp
                                                                      • API String ID: 1799206407-3779749482
                                                                      • Opcode ID: 1090c286c10424d5050651fb8cfff8493fd4ae2110632084a746dc025d3ad9bd
                                                                      • Instruction ID: 65ab9e4af8b3ce2d28531573dd658b931ee6e3a05ac4d6e9ed8074d47c1d497f
                                                                      • Opcode Fuzzy Hash: 1090c286c10424d5050651fb8cfff8493fd4ae2110632084a746dc025d3ad9bd
                                                                      • Instruction Fuzzy Hash: BB31E7B1B0CB4682E7108F56E48036AB7A0FB58BA4F584235DA4DD3794DF7CE558CB00
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$CodeEventExitMultipleObjectsResetThreadWait
                                                                      • String ID: Failed to get extraction thread exit code.$Failed to reset operation complete event.$Failed to wait for operation complete event.$d:\a\wix4\wix4\src\burn\engine\cabextract.cpp
                                                                      • API String ID: 2979751695-3676338304
                                                                      • Opcode ID: b0f0e19d2aeef80889ef2fdce9b50f6dd2143cceb1ca970ca2d039745b42c2e3
                                                                      • Instruction ID: e8e30846dc9ed672fa0666d8acd0b1a4cb125370f74c1695b793cd818490568f
                                                                      • Opcode Fuzzy Hash: b0f0e19d2aeef80889ef2fdce9b50f6dd2143cceb1ca970ca2d039745b42c2e3
                                                                      • Instruction Fuzzy Hash: 853190B1B1861A8EEB60CF29E840BB923E4FB14758F481535D90DD7A94DF38E618CB44
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: AttributesErrorFileLast
                                                                      • String ID: Failed to format variable string.$Failed to set variable to file search path.$Failed while searching file search: %ls, for path: %ls$File search: %ls, did not find path: %ls$d:\a\wix4\wix4\src\burn\engine\search.cpp
                                                                      • API String ID: 1799206407-4254414841
                                                                      • Opcode ID: a41bb36d4f9d47d8d6df555aba33d6efb8da0cdc15a220fbd95cfc4a37b9ecb4
                                                                      • Instruction ID: 4ab64d2d26830859e48029cbe94e6de014fa9783b8a177891f38aea125a35bb2
                                                                      • Opcode Fuzzy Hash: a41bb36d4f9d47d8d6df555aba33d6efb8da0cdc15a220fbd95cfc4a37b9ecb4
                                                                      • Instruction Fuzzy Hash: 0C31B6B1B08B4A86EB109F52E4803BAB3A0FB58BA4F484136DA4DE3795DF7CE555C700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CloseHandle$ErrorEventLast
                                                                      • String ID: Failed to set begin operation event.$Failed to wait for thread to terminate.$d:\a\wix4\wix4\src\burn\engine\cabextract.cpp
                                                                      • API String ID: 477349713-3622178965
                                                                      • Opcode ID: ae98eeaf17bd63a620f04e4ae34fc813bbf68f8450895fb3336af60218ff17c0
                                                                      • Instruction ID: fb7bf397d95b823e9c9c7ed610bec8d4e00d67974952e602c1bf2391931cbc1d
                                                                      • Opcode Fuzzy Hash: ae98eeaf17bd63a620f04e4ae34fc813bbf68f8450895fb3336af60218ff17c0
                                                                      • Instruction Fuzzy Hash: F53181A2B19A4A85FB619F25E85037923E4EF84F54F1D1236C90EEB6A4CF3CE549C304
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast
                                                                      • String ID: Failed to copy host name.$Failed to copy password.$Failed to copy path.$Failed to copy query string.$Failed to copy user name.$Failed to crack URI.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\uriutil.cpp$h
                                                                      • API String ID: 1452528299-3434687612
                                                                      • Opcode ID: cea0aa5efc1f7c9e1bb249afe66edd9a36e630d0e36dcb0b65151b22cc02fe36
                                                                      • Instruction ID: 59a783c66b909e1cb95b0e55f54c0389b155b8b02d0970598bf310e0f0fed1bf
                                                                      • Opcode Fuzzy Hash: cea0aa5efc1f7c9e1bb249afe66edd9a36e630d0e36dcb0b65151b22cc02fe36
                                                                      • Instruction Fuzzy Hash: 50618362B18B668AFB21DB26D8502A977E4FB44798F580035DE4CE7B58DF3CE44AC704
                                                                      APIs
                                                                      • lstrlenW.KERNEL32(?,?,00000000,?,00000001,00000000,?,BundleUpgradeCode,?,00007FF65709D5F2), ref: 00007FF6570EB78C
                                                                      • lstrlenW.KERNEL32(?,?,00000000,?,00000001,00000000,?,BundleUpgradeCode,?,00007FF65709D5F2), ref: 00007FF6570EB82F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: lstrlen
                                                                      • String ID: BundleUpgradeCode$DWORD Overflow while adding length of string to write REG_MULTI_SZ$Failed to allocate space for string while writing REG_MULTI_SZ$Failed to get total string size in bytes$Failed to set registry value to array of strings (first string of which is): %ls$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\regutil.cpp$failed to copy string: %ls
                                                                      • API String ID: 1659193697-1095722736
                                                                      • Opcode ID: 0c8db8c1d647daee6811db65f8cc7edb9aa30ff69f730cd52d0868e6cbdf8dc4
                                                                      • Instruction ID: e82d78bfa1828800bf1ba3cab2a3b963300fd627c71ade77c2c7b10378489c1a
                                                                      • Opcode Fuzzy Hash: 0c8db8c1d647daee6811db65f8cc7edb9aa30ff69f730cd52d0868e6cbdf8dc4
                                                                      • Instruction Fuzzy Hash: B551C572B1864A86EB20DB16E88067A73E5FB84784F580135DE4DE7B94DF3CE54AC704
                                                                      APIs
                                                                        • Part of subcall function 00007FF6570879E8: CreateDirectoryW.KERNELBASE ref: 00007FF657087A0C
                                                                        • Part of subcall function 00007FF6570879E8: GetLastError.KERNEL32 ref: 00007FF657087A1A
                                                                      • lstrlenA.KERNEL32(?,?,00000000,?,?,UninstallString,?,00007FF65709DCCE,?,?,?,?,?,?,?,00000001), ref: 00007FF65709BEF9
                                                                        • Part of subcall function 00007FF6570F34C4: CreateFileW.KERNEL32 ref: 00007FF6570F34FC
                                                                        • Part of subcall function 00007FF6570F34C4: GetLastError.KERNEL32 ref: 00007FF6570F350B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CreateErrorLast$DirectoryFilelstrlen
                                                                      • String ID: Failed to allocate regid file path.$Failed to allocate regid folder path.$Failed to create regid folder: %ls$Failed to format tag folder path.$Failed to write tag xml to file: %ls$UninstallString$d:\a\wix4\wix4\src\burn\engine\registration.cpp$swidtag
                                                                      • API String ID: 583680227-3963219723
                                                                      • Opcode ID: 5eee227d26c5bbc2545bbe0743be1ea8469addc0a4c3c9764afd91f31d42a23d
                                                                      • Instruction ID: d366f2b80d66d087ddffad22d8cc9836789c9f9b0275e44735629bbbee795db7
                                                                      • Opcode Fuzzy Hash: 5eee227d26c5bbc2545bbe0743be1ea8469addc0a4c3c9764afd91f31d42a23d
                                                                      • Instruction Fuzzy Hash: D841B766B08A4AC6EB20DF61D8902BA27A0FF847D4F5C0135EA4EE7795DF3CE4498740
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: lstrlen
                                                                      • String ID: Failed to allocate buffer for escaped string.$Failed to append characters.$Failed to append escape sequence.$Failed to copy string.$Failed to format escape sequence.$[\%c]$[]{}$d:\a\wix4\wix4\src\burn\engine\variable.cpp
                                                                      • API String ID: 1659193697-948137518
                                                                      • Opcode ID: f181f5cfda94b82798c557f91287248f53b5dd61664764472d4e82c33d666d9d
                                                                      • Instruction ID: 6e29e0e1f1b54ea2236c2ffaf0e4114b4d2f0b75232f4e2185adbdee345b5a82
                                                                      • Opcode Fuzzy Hash: f181f5cfda94b82798c557f91287248f53b5dd61664764472d4e82c33d666d9d
                                                                      • Instruction Fuzzy Hash: FE419EA1B0CB4B82FE21DB15E49027A67A1EF89790F8C0135DA4DE7B95EF3CE5498700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                      • String ID: csm$csm$csm
                                                                      • API String ID: 849930591-393685449
                                                                      • Opcode ID: 4a126f0858004de00b91a77098e1360e43e4923f3ec0f1a8572f5c416e274b5d
                                                                      • Instruction ID: 55edfe519c4faa4032f66e8f826e9e478c660af05a7ebad4766e7b98e3a80aaa
                                                                      • Opcode Fuzzy Hash: 4a126f0858004de00b91a77098e1360e43e4923f3ec0f1a8572f5c416e274b5d
                                                                      • Instruction Fuzzy Hash: 4CE17FB2A087498AEB209F65D4402BD7BE4FB45798F085535EE8DE7B55DF38E088CB04
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CompareString
                                                                      • String ID: Failed to copy target product code.$Failed to get msp ui options.$Failed to grow array of ordered patches.$Failed to insert execute action.$Failed to plan action for target product.$d:\a\wix4\wix4\src\burn\engine\mspengine.cpp
                                                                      • API String ID: 1825529933-3199010431
                                                                      • Opcode ID: 006059620466686e38a7c9fd1d41e2364172babfd58cf0fbdff7f952d8eb9982
                                                                      • Instruction ID: 234bccef2c1830c1c2a1a3588cec3049630e9ccc0556df38f33bd079649663c8
                                                                      • Opcode Fuzzy Hash: 006059620466686e38a7c9fd1d41e2364172babfd58cf0fbdff7f952d8eb9982
                                                                      • Instruction Fuzzy Hash: 87A1ABB2B04B5A86EB10CF65D480AAD77A8FB48B98F054536DE4DE7B94DF38D448C710
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CompareString
                                                                      • String ID: BA aborted detect related BUNDLE package.$BundleVersion$Failed to compare related bundle package version: %ls$Failed to parse related bundle package version: %ls$Failed to read version from registry for related bundle package: %ls$d:\a\wix4\wix4\src\burn\engine\bundlepackageengine.cpp
                                                                      • API String ID: 1825529933-91615274
                                                                      • Opcode ID: cb528ebc121b0a8c01e5ef6247dbb88559ba51381a21d680fdfffc3dfeaa80cf
                                                                      • Instruction ID: e204d316749b574abc9da70c085dd54dee58ff1bf07cbc7516500ceb7462ee5e
                                                                      • Opcode Fuzzy Hash: cb528ebc121b0a8c01e5ef6247dbb88559ba51381a21d680fdfffc3dfeaa80cf
                                                                      • Instruction Fuzzy Hash: A951D5B2A18A4AC6EB20CF25D4402AE33E5FB88798F184136EA4DD7B55DF3DE545C740
                                                                      APIs
                                                                        • Part of subcall function 00007FF6570F4AE4: lstrlenW.KERNEL32(?,?,?,?,?,00007FF6570F51B3,?,?,?,?,?,?,?,?,?,00007FF6570A6BDE), ref: 00007FF6570F4B23
                                                                      • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF6570A6EF8), ref: 00007FF6570F550A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Closelstrlen
                                                                      • String ID: Failed to allocate the registry key for dependency "%ls".$Failed to create the dependency registry key "%ls".$Failed to set the %ls registry value to "%ls".$Failed to set the %ls registry value to %d.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\deputil.cpp$default
                                                                      • API String ID: 3903209405-1837950187
                                                                      • Opcode ID: b3908cdabd743303d6dbad002227988a35cc7fc4f003525a060f620f80bd6864
                                                                      • Instruction ID: 3418ffa6a88fd84cac11ee2c7b3060843e32fd2697fb1da0e30981070d792c40
                                                                      • Opcode Fuzzy Hash: b3908cdabd743303d6dbad002227988a35cc7fc4f003525a060f620f80bd6864
                                                                      • Instruction Fuzzy Hash: C0517F72B18B4A86EB208B12E8807AA73F4FB44784F180535EE4DE7B59DF3CE4458740
                                                                      APIs
                                                                      • FreeLibrary.KERNEL32(?,?,?,00007FF6570E0AE4,?,?,00000000,00007FF6570DFD27,?,?,?,00007FF6570DB769), ref: 00007FF6570E0A7C
                                                                      • GetProcAddress.KERNEL32(?,?,?,00007FF6570E0AE4,?,?,00000000,00007FF6570DFD27,?,?,?,00007FF6570DB769), ref: 00007FF6570E0A88
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: AddressFreeLibraryProc
                                                                      • String ID: api-ms-$ext-ms-
                                                                      • API String ID: 3013587201-537541572
                                                                      • Opcode ID: 9729d33b41587ab7f35ee08c5b2844b24fe1ad7c971b0a8f095eaffae6c23831
                                                                      • Instruction ID: bbeb85d4811140ca8640024dbeb9f698fe4ca0900c023d04dd6c3753bc1e0bba
                                                                      • Opcode Fuzzy Hash: 9729d33b41587ab7f35ee08c5b2844b24fe1ad7c971b0a8f095eaffae6c23831
                                                                      • Instruction Fuzzy Hash: 5B41D5A2B19A4F82FA66CB26AC0057623D1BF45BA0F1C4139DD1DEB795EE3CE5498310
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFileLastMove
                                                                      • String ID: d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\fileutil.cpp$failed to create directory while moving file: '%ls' to: '%ls'$failed to move file: '%ls' to: '%ls'
                                                                      • API String ID: 55378915-4053860161
                                                                      • Opcode ID: 6c4a27557705df402d0dd7d67f60055d13dfcfda9cb0b851866f681bd73868ca
                                                                      • Instruction ID: 0da93bc3378b0cc6e0fcb9eaec3bacd60387e48d8bee0ae0b5f938ef65570334
                                                                      • Opcode Fuzzy Hash: 6c4a27557705df402d0dd7d67f60055d13dfcfda9cb0b851866f681bd73868ca
                                                                      • Instruction Fuzzy Hash: EC41CDA1B1874A82FB609B169840A3D63D1AF88BD0F1C4035DE4EE3794DE3CE859CB08
                                                                      APIs
                                                                        • Part of subcall function 00007FF6570F4AE4: lstrlenW.KERNEL32(?,?,?,?,?,00007FF6570F51B3,?,?,?,?,?,?,?,?,?,00007FF6570A6BDE), ref: 00007FF6570F4B23
                                                                      • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,00007FF6570A6BDE,?,?,?,?,?,00007FF6570A681A), ref: 00007FF6570F52F4
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Closelstrlen
                                                                      • String ID: Failed to allocate the registry key for dependency "%ls".$Failed to get the id for the dependency "%ls".$Failed to get the name for the dependency "%ls".$Failed to get the version for the dependency "%ls".$Failed to open the registry key for the dependency "%ls".$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\deputil.cpp
                                                                      • API String ID: 3903209405-4075874421
                                                                      • Opcode ID: 3bb1e8b4410e277c7d05c4e48e9c1a6479f0067b10255a7b6e57f7892f59e7e1
                                                                      • Instruction ID: 52eb2670361521e7d71e769c35d1b45c25b9a2a10a827f9e3e6d20ccefd2e048
                                                                      • Opcode Fuzzy Hash: 3bb1e8b4410e277c7d05c4e48e9c1a6479f0067b10255a7b6e57f7892f59e7e1
                                                                      • Instruction Fuzzy Hash: 9241B3A1B08B4E86EB608B52E8C017A62E4FF99B90F1C4531DE1DE7B55DF3DE8498704
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Failed to allocate a copy of the source string.$Failed to convert the string case.$Failed to get the length of the string.$Source string is too long: %Iu$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\strutil.cpp
                                                                      • API String ID: 0-2897498883
                                                                      • Opcode ID: 6af81e918d7376661143e580a6c107a6a87637f6b25fbe547b864396dbf8c8cd
                                                                      • Instruction ID: 12ca45761a66a5ab08524fb86bf346e31a412dcd7f02bbc2a96772d24f5d6198
                                                                      • Opcode Fuzzy Hash: 6af81e918d7376661143e580a6c107a6a87637f6b25fbe547b864396dbf8c8cd
                                                                      • Instruction Fuzzy Hash: 7141E5A1B1874AC6EB208B51E88057A73E1AF94BA0F5C0139C90DE7B91EF3CE518C704
                                                                      APIs
                                                                      • RegCloseKey.ADVAPI32(?,?,00000000,?,?,?,?,00007FF6570B9567), ref: 00007FF6570B9392
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Close
                                                                      • String ID: Failed to build full key path.$Failed to open registry key: %ls.$Failed to read QuietUninstallString.$QuietUninstallString$SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\$d:\a\wix4\wix4\src\burn\engine\bundlepackageengine.cpp
                                                                      • API String ID: 3535843008-1706903631
                                                                      • Opcode ID: 2b9439b3b14b78849ad5d48e88a30c2fe6a3e6a89a1afee7eaad107850a8e180
                                                                      • Instruction ID: 20602fd18b4948aea8c019e3707a238241d1e040b5b9250bbce522d04b691679
                                                                      • Opcode Fuzzy Hash: 2b9439b3b14b78849ad5d48e88a30c2fe6a3e6a89a1afee7eaad107850a8e180
                                                                      • Instruction Fuzzy Hash: C041ACB2B19B4AC6EB208F51E4806A933A4FB88794F590135DE5DE7791DF3CE64AC700
                                                                      APIs
                                                                      • CopyFileW.KERNEL32(?,?,?,?,-00000002,00000000,00000000,00007FF6570F23BB), ref: 00007FF6570F2229
                                                                      • GetLastError.KERNEL32(?,?,?,?,-00000002,00000000,00000000,00007FF6570F23BB), ref: 00007FF6570F2237
                                                                      • CopyFileW.KERNEL32(?,?,?,?,-00000002,00000000,00000000,00007FF6570F23BB), ref: 00007FF6570F22F1
                                                                      • GetLastError.KERNEL32(?,?,?,?,-00000002,00000000,00000000,00007FF6570F23BB), ref: 00007FF6570F22FB
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CopyErrorFileLast
                                                                      • String ID: d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\fileutil.cpp$failed to copy file: '%ls' to: '%ls'$failed to create directory while copying file: '%ls' to: '%ls'
                                                                      • API String ID: 374144340-3418930266
                                                                      • Opcode ID: a7b63d5db7519201cbb653cb4c980c1eef6e8ee8f073aa7e1b0e76553facb045
                                                                      • Instruction ID: ed7e1d65209017b7aeaeb1462f1d874b1d0cb460eef8a2a0bb5b591e37ec9242
                                                                      • Opcode Fuzzy Hash: a7b63d5db7519201cbb653cb4c980c1eef6e8ee8f073aa7e1b0e76553facb045
                                                                      • Instruction Fuzzy Hash: CC418FE1B0875A82EB609B66988063D73D4AF44B90F584535DE4DE37A4EF3CE849C708
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CompareString
                                                                      • String ID: ALL$Failed to add "%ls" to the list of dependencies to ignore.$Failed to add "%ls" to the string dictionary.$Failed to check the dictionary of unique dependencies.$Failed to create the string dictionary.$d:\a\wix4\wix4\src\burn\engine\dependency.cpp
                                                                      • API String ID: 1825529933-461799926
                                                                      • Opcode ID: f6a70afddf6bc7f433e2edca49d94eb57e023312edb37d7a6b9c3fc28c69a44e
                                                                      • Instruction ID: 11112cba536ccd15e57ac37717f72ae420c89fd477097e0292dc8f920fd14aeb
                                                                      • Opcode Fuzzy Hash: f6a70afddf6bc7f433e2edca49d94eb57e023312edb37d7a6b9c3fc28c69a44e
                                                                      • Instruction Fuzzy Hash: E841D4B2B0865A86FB209F12E4403AA67E0FB84B90F4C4635DA4DE77D1DF7CE5498704
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Close
                                                                      • String ID: An invalid parameter was passed to the function.$Failed to locate and query bundle variable.$Failed to read string shared variable.$Reading bundle variable of type 0x%x not implemented.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\butil.cpp$variables
                                                                      • API String ID: 3535843008-2641142750
                                                                      • Opcode ID: f179bd3d620ea337dc6ae7648bab44f866cb39d89281ff0fab4e64799e5261b4
                                                                      • Instruction ID: 794b958b0b031703af92e01ee4cb38821cebba03ae9e252aa8f7e8bf775fefb0
                                                                      • Opcode Fuzzy Hash: f179bd3d620ea337dc6ae7648bab44f866cb39d89281ff0fab4e64799e5261b4
                                                                      • Instruction Fuzzy Hash: C741C1B1B0C74A8AEB208B12D8806B973E1BF85780F9C0139DA4DE7795DF2DE909C745
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: _cwprintf_s_l
                                                                      • String ID: Failed to create version from file version.$Failed to format path string.$Failed to get file version.$Failed to set variable.$File search: %ls, did not find path: %ls$d:\a\wix4\wix4\src\burn\engine\search.cpp
                                                                      • API String ID: 2941638530-3858641006
                                                                      • Opcode ID: 3a30915db2c48a586e32f6ed9b0d32fd78c111b923a86346f7d1b8247ef3a0cd
                                                                      • Instruction ID: 5c83a01cf1bcb3cb5986c4917a50ab319fb89bc5704f7fe1c96ac7120f7fdf7a
                                                                      • Opcode Fuzzy Hash: 3a30915db2c48a586e32f6ed9b0d32fd78c111b923a86346f7d1b8247ef3a0cd
                                                                      • Instruction Fuzzy Hash: 4931F9A1B08A5B86FB10DF52D4413F953A0FF58B98F480132EA0DE7B95DF2CD5598700
                                                                      APIs
                                                                      • EnterCriticalSection.KERNEL32(?,?,?,?,?,00007FF6570D142F,?,?,?,?,?,00007FF6570B899A), ref: 00007FF6570D077F
                                                                      • LeaveCriticalSection.KERNEL32(?,?,?,?,?,00007FF6570D142F,?,?,?,?,?,00007FF6570B899A), ref: 00007FF6570D07C0
                                                                      • ReleaseSemaphore.KERNEL32(?,?,?,?,?,00007FF6570D142F,?,?,?,?,?,00007FF6570B899A), ref: 00007FF6570D07E7
                                                                      • GetLastError.KERNEL32(?,?,?,?,?,00007FF6570D142F,?,?,?,?,?,00007FF6570B899A), ref: 00007FF6570D07F1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalSection$EnterErrorLastLeaveReleaseSemaphore
                                                                      • String ID: Failed to enqueue action.$Failed to signal queue semaphore.$d:\a\wix4\wix4\src\burn\engine\externalengine.cpp
                                                                      • API String ID: 540623443-3073591944
                                                                      • Opcode ID: 64961a48ee5c2188e11fef9889a49171b6900b63d59c6242bf9fb24494b36200
                                                                      • Instruction ID: 41fd5fa70b9431146c5f53e7df3ee486d41c62fb4755aa023badb60e51ebddb4
                                                                      • Opcode Fuzzy Hash: 64961a48ee5c2188e11fef9889a49171b6900b63d59c6242bf9fb24494b36200
                                                                      • Instruction Fuzzy Hash: CE21A062B18B4682EB10DF16D48037A63E4FB94B80F884036DA4DE7795DF7CE559C744
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: File$ErrorFindLast$AttributesCloseDeleteFirst
                                                                      • String ID: Failed to delete file: %ls$Failed to remove attributes from file: %ls$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\fileutil.cpp
                                                                      • API String ID: 3967264933-3778428042
                                                                      • Opcode ID: 1784234101db1dc2e49455ad321c618b1b825b39f8d99023c2e37cfe73bfc7be
                                                                      • Instruction ID: dd792e89a395b16a40d4ba38317f6c606c37af95dc55ac5dc177ff560b5d1e51
                                                                      • Opcode Fuzzy Hash: 1784234101db1dc2e49455ad321c618b1b825b39f8d99023c2e37cfe73bfc7be
                                                                      • Instruction Fuzzy Hash: 7721C5A0B0C78682F710ABA5E88077E63E4AF807A0F4C4135DD4DD7694EFACE558CB58
                                                                      APIs
                                                                        • Part of subcall function 00007FF657081A28: LoadLibraryExW.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6570811A9), ref: 00007FF657081A58
                                                                        • Part of subcall function 00007FF657081A28: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6570811A9), ref: 00007FF657081A66
                                                                      • GetProcAddress.KERNEL32 ref: 00007FF6570EC149
                                                                      • GetLastError.KERNEL32 ref: 00007FF6570EC15B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$AddressLibraryLoadProc
                                                                      • String ID: Failed to find set restore point proc address.$Failed to initialize security for COM to talk to system restore.$SRSetRestorePointW$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\srputil.cpp$srclient.dll
                                                                      • API String ID: 1866314245-3391705418
                                                                      • Opcode ID: 62bd9539a885722edca75bd10437ae1dc13eca6852469989d0812fbb6b7709e7
                                                                      • Instruction ID: a59b97f23755f8100fcdefd89ea27889fdc6c139480eb3fccb0fca8267ab2251
                                                                      • Opcode Fuzzy Hash: 62bd9539a885722edca75bd10437ae1dc13eca6852469989d0812fbb6b7709e7
                                                                      • Instruction Fuzzy Hash: 862137A0B1CB4F85FB219B16E89027A22E0AF95754F5C013ADD0DE63A1EE7DE9498300
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: AddressErrorHandleLastModuleProc
                                                                      • String ID: Failed to check WOW64 process - IsWow64Process2.$IsWow64Process2$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\procutil.cpp$kernel32
                                                                      • API String ID: 4275029093-1827600283
                                                                      • Opcode ID: 61359b56e72ec1a02445d8a23ea30af197e097ca23a4187337d9ea88c900ac63
                                                                      • Instruction ID: 8f76d087a8059be89eb63288797c9e736cf66072f383437fd867e2cc5f1f2058
                                                                      • Opcode Fuzzy Hash: 61359b56e72ec1a02445d8a23ea30af197e097ca23a4187337d9ea88c900ac63
                                                                      • Instruction Fuzzy Hash: 55118161B187869AEB109F56E8801A673E0BF88B90F48013ADA4DE3764DF6CE549C704
                                                                      APIs
                                                                        • Part of subcall function 00007FF657081A28: LoadLibraryExW.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6570811A9), ref: 00007FF657081A58
                                                                        • Part of subcall function 00007FF657081A28: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6570811A9), ref: 00007FF657081A66
                                                                      • GetProcAddress.KERNEL32(?,?,?,?,00000000,00007FF657089613), ref: 00007FF6570EA2C8
                                                                      • GetProcAddress.KERNEL32(?,?,?,?,00000000,00007FF657089613), ref: 00007FF6570EA2E3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: AddressProc$ErrorLastLibraryLoad
                                                                      • String ID: AdvApi32.dll$Failed to load AdvApi32.dll$RegDeleteKeyExW$RegGetValueW$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\regutil.cpp
                                                                      • API String ID: 856020675-1672349681
                                                                      • Opcode ID: c85ce38fdfc4f87e5ef05738976b5605533dee84822bdbd8f1f470c84510dcfd
                                                                      • Instruction ID: f790d91e9f6298ae2c572f267aeec86769734851d0b5e24e0f7adc67ad51489d
                                                                      • Opcode Fuzzy Hash: c85ce38fdfc4f87e5ef05738976b5605533dee84822bdbd8f1f470c84510dcfd
                                                                      • Instruction Fuzzy Hash: 3F11D2B0A18A0B85EF20CB01FC915B533A4AF48744B8C4035C90EEA260EF3CA19DC710
                                                                      APIs
                                                                      • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,?), ref: 00007FF6570F870E
                                                                      • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,?), ref: 00007FF6570F872F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: lstrlen
                                                                      • String ID: Failed to break URL into server and resource parts.$Failed to connect to URL: %ls$Failed to open internet URL: %ls$Failed to send request to URL: %ls$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\dlutil.cpp
                                                                      • API String ID: 1659193697-573936277
                                                                      • Opcode ID: 6e19d9e7a5cbb421d1c2c5307b88a6b5bce926a522ae4b9e986f48f6518da28c
                                                                      • Instruction ID: 87b51681370ee4630a1c7f4d71d45ce41a836f3f2e37da45da7ffd6f377f36eb
                                                                      • Opcode Fuzzy Hash: 6e19d9e7a5cbb421d1c2c5307b88a6b5bce926a522ae4b9e986f48f6518da28c
                                                                      • Instruction Fuzzy Hash: 91815D76B08B5A86EB60CF52E8402A977A0FB88B84F580135DE4DE7B94EF3CD549C344
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CloseHandle$CriticalDeleteSection
                                                                      • String ID:
                                                                      • API String ID: 2166061224-0
                                                                      • Opcode ID: c166dbbf86232752d0a6f6da6bff20c310b5647220ac60e83a23736501b5ba59
                                                                      • Instruction ID: 77ee89ec3a60ec4c9dda96c2e182d6cb6e1ccc77f7dc0a2c4850fe3bd983cbf0
                                                                      • Opcode Fuzzy Hash: c166dbbf86232752d0a6f6da6bff20c310b5647220ac60e83a23736501b5ba59
                                                                      • Instruction Fuzzy Hash: 8B711D95B1A58A84FF95FFA1C4657BC2390EF81F58F8D0231D91EEA5D6CF28A44C8321
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalSection$EnterLeave
                                                                      • String ID: *****$Failed to format value '%ls' of variable: %ls$Failed to get unformatted string.$Failed to get value as string for variable: %ls$Failed to get variable: %ls$d:\a\wix4\wix4\src\burn\engine\variable.cpp
                                                                      • API String ID: 3168844106-1256323647
                                                                      • Opcode ID: 65b1cf21c730bcec377a52bec00012e987b15df618c37247e8e664d92cbaa7ba
                                                                      • Instruction ID: c9bb76f1d1f2d3e94ea97c038054cb111885d56b3e380627b2f8fe4f31876082
                                                                      • Opcode Fuzzy Hash: 65b1cf21c730bcec377a52bec00012e987b15df618c37247e8e664d92cbaa7ba
                                                                      • Instruction Fuzzy Hash: ED41A0A2B18B5686EB20DF11E88036A63E4FB48784F484235DE8CE7B95DF3DE559C740
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$AllocProcess
                                                                      • String ID: Failed to allocate array larger.$Failed to allocate new array.$Failed to get current memory size.$Integer overflow when calculating new block size.$Integer overflow when calculating new element count.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\memutil.cpp
                                                                      • API String ID: 1617791916-4167099675
                                                                      • Opcode ID: a2f9725e89f93331c5c13d81114fbb0b44cb628460378933a860b9ae8ed4a6d2
                                                                      • Instruction ID: 8050ff97c2ba89daea86b8a7fd3c3f88e1459ffaf6b10430bf602ec35b8aa253
                                                                      • Opcode Fuzzy Hash: a2f9725e89f93331c5c13d81114fbb0b44cb628460378933a860b9ae8ed4a6d2
                                                                      • Instruction Fuzzy Hash: 6E41EE71B18B4AC2EB208F01E48067923E8FB88794F5C4135DA8CE7796EF7DE9598344
                                                                      APIs
                                                                      • GetProcessHeap.KERNEL32(?,?,?,?,?,?,00000000,00007FF6570F37B1,?,?,?,?,?,00007FF6570F4621), ref: 00007FF657086CAC
                                                                      • HeapAlloc.KERNEL32(?,?,?,?,?,?,00000000,00007FF6570F37B1,?,?,?,?,?,00007FF6570F4621), ref: 00007FF657086CBD
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$AllocProcess
                                                                      • String ID: Failed to allocate larger array.$Failed to allocate new array.$Failed to get current memory size.$Integer overflow when calculating new block size.$Integer overflow when calculating new element count.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\memutil.cpp
                                                                      • API String ID: 1617791916-3641055160
                                                                      • Opcode ID: 2e347de48ae5210da34ef6123c449023f60b600317269cd9ec57339e4daf8507
                                                                      • Instruction ID: a46e126534828d6b55f0dbb214533ec7506f745a978f63d82b80677bb0b170da
                                                                      • Opcode Fuzzy Hash: 2e347de48ae5210da34ef6123c449023f60b600317269cd9ec57339e4daf8507
                                                                      • Instruction Fuzzy Hash: CA31BFA1F1874A82EB20CF51E44027923E5EB88790F5C8035DA0DE7796EF7DE959C300
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Close
                                                                      • String ID: Failed to detect bundle install state.$Failed to overwrite the bundle reboot-pending built-in variable.$Failed to set the bundle installed built-in variable.$RebootPending$WixBundleInstalled$d:\a\wix4\wix4\src\burn\engine\registration.cpp
                                                                      • API String ID: 3535843008-1968631062
                                                                      • Opcode ID: 5b909350221fac9d7eb536c7eb1e7d7d95e86c505880354112392d818bc59b72
                                                                      • Instruction ID: 0195e5ae6a16400485bf777bc30fa49458532c08ec58be49c86b12873fab1e32
                                                                      • Opcode Fuzzy Hash: 5b909350221fac9d7eb536c7eb1e7d7d95e86c505880354112392d818bc59b72
                                                                      • Instruction Fuzzy Hash: F73184B1B0C74686EB609B51E44016AB3D4BF98B90F4C0139DA4DE3B95DF6CE559C704
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter_noinfo
                                                                      • String ID: f$p$p
                                                                      • API String ID: 3215553584-1995029353
                                                                      • Opcode ID: 186e8c00f616c4aebedd0c98e44cecd971292ab9af835d549ba69a6bd0b938fd
                                                                      • Instruction ID: f8b1635bcb232c278cf70f64636212fad24d4d4347a0d804f53cbf6b3d0a7e2c
                                                                      • Opcode Fuzzy Hash: 186e8c00f616c4aebedd0c98e44cecd971292ab9af835d549ba69a6bd0b938fd
                                                                      • Instruction Fuzzy Hash: B812B8B5E0C34B8AFB609B54E04467B76D2FB40764F9C4136E689E66C4DF7CE4888B18
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Close$HandleMutexRelease
                                                                      • String ID: ElevatedOnExecuteActionComplete failed.$Failed to save state.$Unexpected elevated message sent to child process, msg: %u$d:\a\wix4\wix4\src\burn\engine\elevation.cpp
                                                                      • API String ID: 2585119886-3943832688
                                                                      • Opcode ID: ffb922df0ff9cc24ae47539712bd65e4019c4a6e29a6c7f79b9ae3f81cd1124c
                                                                      • Instruction ID: d812f8d84e43000430460a7099c27afb41335d839e7a003216790f89bebd0664
                                                                      • Opcode Fuzzy Hash: ffb922df0ff9cc24ae47539712bd65e4019c4a6e29a6c7f79b9ae3f81cd1124c
                                                                      • Instruction Fuzzy Hash: 02E12CB6A18B4A82DB20CF19D04056D77A0FB89F94F185136EA4DE3764CF39EA95C740
                                                                      APIs
                                                                      • CompareStringW.KERNEL32(?,?,00000008,00000008,00000000,00000000,?,00007FF65708E5E7,?,?,?,?,?,?,00000000,?), ref: 00007FF65708EA6B
                                                                      • CompareStringW.KERNEL32(?,?,00000008,00000008,00000000,00000000,?,00007FF65708E5E7,?,?,?,?,?,?,00000000,?), ref: 00007FF65708EAD5
                                                                      • CompareStringW.KERNEL32(?,?,00000008,00000008,00000000,00000000,?,00007FF65708E5E7,?,?,?,?,?,?,00000000,?), ref: 00007FF65708EB14
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CompareString
                                                                      • String ID: Failed to get length of left string: %ls$Failed to get length of right string: %ls$d:\a\wix4\wix4\src\burn\engine\condition.cpp
                                                                      • API String ID: 1825529933-3020116174
                                                                      • Opcode ID: 828d9cac5596a1cb5244e65540a33104c785a6212337f67503ff0c4215d153ee
                                                                      • Instruction ID: cb1e970af51a6802fbc1317076743c4884a7e1ac180b08ce3efb78b5fc38b046
                                                                      • Opcode Fuzzy Hash: 828d9cac5596a1cb5244e65540a33104c785a6212337f67503ff0c4215d153ee
                                                                      • Instruction Fuzzy Hash: B06147A2F1C69A82E7708B59A48067A62D5BB94B90F1C0135ED8DF7B91CE7CF5888740
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Sleep
                                                                      • String ID: Failed to calculate cache path.$Failed to get %hs package cache root directory.$Failed to get old %hs package cache root directory.$d:\a\wix4\wix4\src\burn\engine\cache.cpp$per-machine$per-user
                                                                      • API String ID: 3472027048-1762823252
                                                                      • Opcode ID: 116b6ca4c9674d50851841a3b7ec2f12dad6b7fdf7b42a88c7dfdc15611fe909
                                                                      • Instruction ID: 3dd2b3ca5c14c92f7ab74073326ea883894583c5f489ba9205e37430e3355abf
                                                                      • Opcode Fuzzy Hash: 116b6ca4c9674d50851841a3b7ec2f12dad6b7fdf7b42a88c7dfdc15611fe909
                                                                      • Instruction Fuzzy Hash: 67519161B18A4A86FB108B55E8407BA67E0FBC5B80F584135EE4DE7B95DF3CE5888740
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter_noinfo
                                                                      • String ID: Error reading wix version registry value due to unexpected data type: %u$Failed to convert registry string to wix version.$Failed to copy QWORD wix version value.$Failed to read wix version registry value.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\regutil.cpp
                                                                      • API String ID: 3215553584-1929277467
                                                                      • Opcode ID: 3f5e865de9b2309ef8e9ddfd12c0966e87e208405f892668fdec9245928c6d8d
                                                                      • Instruction ID: d162aa33fa5072b0c7fb3e73d84496dedaaf8d7518fc3d6fe1ab36a626d6032c
                                                                      • Opcode Fuzzy Hash: 3f5e865de9b2309ef8e9ddfd12c0966e87e208405f892668fdec9245928c6d8d
                                                                      • Instruction Fuzzy Hash: D4518B72F18A5A89FB10AB61D840ABD23E4AF49794F580139DE0DE7B85DF3CE9498740
                                                                      APIs
                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6570F8778), ref: 00007FF6570F89E8
                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6570F8778), ref: 00007FF6570F8A54
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast
                                                                      • String ID: Failed to add header to HTTP request.$Failed to allocate string for resource URI.$Failed to append query strong to resource from URI.$Failed to open internet request.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\dlutil.cpp
                                                                      • API String ID: 1452528299-283382383
                                                                      • Opcode ID: 8de55f3ae9f41a753a187427e9074a637fe2a1917d09737b3883c974e6877e4f
                                                                      • Instruction ID: 8e499cbe9f73f9ef84fe25b06e9c86d3466508c5fea4eee3a164f010531a34c3
                                                                      • Opcode Fuzzy Hash: 8de55f3ae9f41a753a187427e9074a637fe2a1917d09737b3883c974e6877e4f
                                                                      • Instruction Fuzzy Hash: E0518062B0C74686FB208F15E4802A962E5FF84B90F5C4136DA4DE7BA4EF3CE5498744
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter_noinfo
                                                                      • String ID: Error reading version registry value due to unexpected data type: %u$Failed to convert registry string to version.$Failed to copy QWORD version value.$Failed to read version registry value.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\regutil.cpp
                                                                      • API String ID: 3215553584-2150151203
                                                                      • Opcode ID: 4acf3cf64eef7684fbedf85b663bbc6aff33fac5b32c1dccde2d67ea2313ea77
                                                                      • Instruction ID: 03f8198763ab36410473c93176f11139d828fd9061f8c22f812ee5d42c2e4c62
                                                                      • Opcode Fuzzy Hash: 4acf3cf64eef7684fbedf85b663bbc6aff33fac5b32c1dccde2d67ea2313ea77
                                                                      • Instruction Fuzzy Hash: 4441BCB1B0C71B86FB20AB01E485B7D62E1AB49B90F580135DA2CE7B95DF3DE9498740
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast
                                                                      • String ID: Failed to allocate memory for value.$Failed to allocate value.$Failed to get query information.$Failed to get size of value.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\inetutil.cpp
                                                                      • API String ID: 1452528299-3024109871
                                                                      • Opcode ID: 432a63f09e13db5913904e10d436679de2194ba7f5563b937935c80f7e19b7d6
                                                                      • Instruction ID: 2c10b4ba238ae36b2d37028e3271b9754fd3124c060c4643046a1b1a4fbc6040
                                                                      • Opcode Fuzzy Hash: 432a63f09e13db5913904e10d436679de2194ba7f5563b937935c80f7e19b7d6
                                                                      • Instruction Fuzzy Hash: 8141A371B18B5686EB508F65D8903B923A0FB94754F084536EA0EE7794EF3CE94AC344
                                                                      APIs
                                                                      • CompareStringW.KERNEL32(?,?,00000000,?,?,00000000,?,00007FF65709DE80), ref: 00007FF65709B7E4
                                                                      • RegCloseKey.ADVAPI32(?,?,00000000,?,?,00000000,?,00007FF65709DE80), ref: 00007FF65709B7FA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CloseCompareString
                                                                      • String ID: Failed to format key for update registration.$Failed to remove update registration key: %ls$PackageVersion$d:\a\wix4\wix4\src\burn\engine\registration.cpp
                                                                      • API String ID: 446873843-2063007608
                                                                      • Opcode ID: c372acd96132197c9d74e289b9708ecaae52f23e14c16fcf4d24625eb887ec16
                                                                      • Instruction ID: e3b2d47abab473753ea011258c2eacb1cd21970cf6ffd5992c2ef96a28e00ce9
                                                                      • Opcode Fuzzy Hash: c372acd96132197c9d74e289b9708ecaae52f23e14c16fcf4d24625eb887ec16
                                                                      • Instruction Fuzzy Hash: FC4173B2708A4A86EB209F25E8806BA67E4FF587D4F580135EE4EE7A54CF3CD449C700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: AttributesErrorFileInitializeLast
                                                                      • String ID: Failed to allocate administrator SID.$Failed to initialize ACL.$d:\a\wix4\wix4\src\burn\engine\cache.cpp
                                                                      • API String ID: 669721577-2625618253
                                                                      • Opcode ID: 8e59cbe473a6e253b4a6c021cd947ae2fa7331b7bef28d00b1e9d5ef92eba84c
                                                                      • Instruction ID: b0617807fa479ec91916a731cd5ceb322c4cba1b353fde366aee138c38937b43
                                                                      • Opcode Fuzzy Hash: 8e59cbe473a6e253b4a6c021cd947ae2fa7331b7bef28d00b1e9d5ef92eba84c
                                                                      • Instruction Fuzzy Hash: A031C172B1864A82FB108F12E44076A67E1FBC8B80F584135DA8DD77A5DF3CE549CB04
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CloseCreateErrorFileHandleLast
                                                                      • String ID: Failed to open file: %ls$Failed to write to file: %ls$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\fileutil.cpp
                                                                      • API String ID: 2528220319-1719111557
                                                                      • Opcode ID: 99d3e8ec0696c0884044644f8efd2176d13fc7ed8831a43601569a475fb69c97
                                                                      • Instruction ID: c52da00ba16e6832a783994221f9d7f692aedd1716add15af7ffd191a390326f
                                                                      • Opcode Fuzzy Hash: 99d3e8ec0696c0884044644f8efd2176d13fc7ed8831a43601569a475fb69c97
                                                                      • Instruction Fuzzy Hash: 48315EB2B0874586EB209B16E8402A976E4AB84BB0F180335DA6DD77E5CF3CD559CB04
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFormatFreeLastLocalMessage
                                                                      • String ID: Failed to allocate string for message.$Failed to format message for error: 0x%x$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\strutil.cpp
                                                                      • API String ID: 1365068426-3351270200
                                                                      • Opcode ID: 17f0db0e33cdc373b52a48f3b47251fb9951c13d4449b801879dc6a0def0b33a
                                                                      • Instruction ID: dc6d57d041da9f6f09016164a2f49aceb9cc01f425617dd2afe7117a21ab9126
                                                                      • Opcode Fuzzy Hash: 17f0db0e33cdc373b52a48f3b47251fb9951c13d4449b801879dc6a0def0b33a
                                                                      • Instruction Fuzzy Hash: AC31A1B2718B4992EB218F15E8847AA32E1FB98780F184139DA4DD7744EF3DD919C704
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: String$AllocFree
                                                                      • String ID: d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\xmlutil.cpp$failed to allocate bstr for XPath expression in XmlSelectSingleNode$pixnParent parameter was null in XmlSelectSingleNode$ppixnChild parameter was null in XmlSelectSingleNode
                                                                      • API String ID: 344208780-1462723567
                                                                      • Opcode ID: 6b157b56f3b9731659039f7257b84d39456d127d90d4d0a58a4fdd0394a5ea7c
                                                                      • Instruction ID: 5882f55f23266d9480c23f5a5ac0a7f189c9dec54dc7ce5815c24df9c92f2c42
                                                                      • Opcode Fuzzy Hash: 6b157b56f3b9731659039f7257b84d39456d127d90d4d0a58a4fdd0394a5ea7c
                                                                      • Instruction Fuzzy Hash: 9421B6A5B2861A82EB20CB06E84017563E5AF99BD0F9C0135DD4DE37A5DF3CE90AC704
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: String$AllocFree
                                                                      • String ID: d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\xmlutil.cpp$failed to allocate bstr for XPath expression in XmlSelectNodes$pixnParent parameter was null in XmlSelectNodes$ppixnChild parameter was null in XmlSelectNodes
                                                                      • API String ID: 344208780-3683195698
                                                                      • Opcode ID: c50f91a02a9ba2c650dd86bb3b8c46904f23a4c66dfbbd1e2e9d3105a309bc45
                                                                      • Instruction ID: 0e0bc013211617649b9110ce1363015b2b00deaa21792ab59f45172e69a5bfb8
                                                                      • Opcode Fuzzy Hash: c50f91a02a9ba2c650dd86bb3b8c46904f23a4c66dfbbd1e2e9d3105a309bc45
                                                                      • Instruction Fuzzy Hash: 3C21B9A5B1865A82EB20CB05E84017963E5AF99BD0F5C4136CD4DE37A4DF3CE90A8704
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Value$ErrorLast
                                                                      • String ID:
                                                                      • API String ID: 2506987500-0
                                                                      • Opcode ID: ceea9ac769fb214935b2432e45667e585b16961fe368f67a92c4c593ab1c1345
                                                                      • Instruction ID: a4d60dfdc12c8a758521f794ae5986b30b55665dcb46c6093e7db6315a395f97
                                                                      • Opcode Fuzzy Hash: ceea9ac769fb214935b2432e45667e585b16961fe368f67a92c4c593ab1c1345
                                                                      • Instruction Fuzzy Hash: 4C212CB4F0834F42FB686731595513A62D25F44BB4F1C4734E93EE67D6DE6CA4494208
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                      • String ID: CONOUT$
                                                                      • API String ID: 3230265001-3130406586
                                                                      • Opcode ID: eaaa479d72015e632d8ee55f5a571fbad3eebd4925cdca1ed9c1269a34c0d8eb
                                                                      • Instruction ID: ec98796760a7d70c2bf4bf9543dc0d2340d746051407500131980005448da67b
                                                                      • Opcode Fuzzy Hash: eaaa479d72015e632d8ee55f5a571fbad3eebd4925cdca1ed9c1269a34c0d8eb
                                                                      • Instruction Fuzzy Hash: 18119361B18A8586E7508F52F84432972E0FB88FE4F084234DE5ED7B94CF7CE4488748
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CreateFromInstanceProg
                                                                      • String ID: Failed to create instance of Microsoft.Update.AutoUpdate.$Failed to get CLSID for Microsoft.Update.AutoUpdate.$Microsoft.Update.AutoUpdate$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\wuautil.cpp
                                                                      • API String ID: 2151042543-594154128
                                                                      • Opcode ID: ad0ded6dfa0d0fe83d532d465e80f50d1354fc709d76dd964e1c87672f85a841
                                                                      • Instruction ID: f179205a4c16424085573e7f56041ecf774696c817cac428620a47fa8e61d31b
                                                                      • Opcode Fuzzy Hash: ad0ded6dfa0d0fe83d532d465e80f50d1354fc709d76dd964e1c87672f85a841
                                                                      • Instruction Fuzzy Hash: 76115B71B18B8AC2EB208B11F8440AA73E1FB48794F880132EA5DD3754EF3DE559C744
                                                                      APIs
                                                                      • GetModuleHandleW.KERNEL32(?,?,?,00007FF6570FDDAF,?,?,?,00007FF6570FE16A), ref: 00007FF6570FDE67
                                                                      • GetProcAddress.KERNEL32(?,?,?,00007FF6570FDDAF,?,?,?,00007FF6570FE16A), ref: 00007FF6570FDE84
                                                                      • GetProcAddress.KERNEL32(?,?,?,00007FF6570FDDAF,?,?,?,00007FF6570FE16A), ref: 00007FF6570FDEA0
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: AddressProc$HandleModule
                                                                      • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                                                      • API String ID: 667068680-1718035505
                                                                      • Opcode ID: 67fc19edb64316081c6316322a8cc13e9b6b4468c87a515185f59ba91aa51a72
                                                                      • Instruction ID: dd5a750e0e6b6938be48c293f93b32da21448417e542d3fd82cf399e64a5d5ad
                                                                      • Opcode Fuzzy Hash: 67fc19edb64316081c6316322a8cc13e9b6b4468c87a515185f59ba91aa51a72
                                                                      • Instruction Fuzzy Hash: A31121A1A0EB1F95FE69AF01A91037562D16F24788F4C5538C91DE6390EF7CB45EC218
                                                                      APIs
                                                                      • EnterCriticalSection.KERNEL32(?,?,?,?,00000000,00007FF6570899F2), ref: 00007FF6570E8187
                                                                      • FlushFileBuffers.KERNEL32(?,?,?,?,00000000,00007FF6570899F2), ref: 00007FF6570E819F
                                                                      • GetLastError.KERNEL32(?,?,?,?,00000000,00007FF6570899F2), ref: 00007FF6570E81A9
                                                                      • LeaveCriticalSection.KERNEL32(?,?,?,?,00000000,00007FF6570899F2), ref: 00007FF6570E820F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalSection$BuffersEnterErrorFileFlushLastLeave
                                                                      • String ID: Failed to flush log file buffers.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\logutil.cpp
                                                                      • API String ID: 1143292862-3789970458
                                                                      • Opcode ID: c3a2b53d9f415d193179b3a4f2a41519db370e4a7151b46eb95b709d6bdc05f7
                                                                      • Instruction ID: 63f83cddb616d2d5019b5af88b21d78f49fdbbb182647abb92c469bbf1d2e071
                                                                      • Opcode Fuzzy Hash: c3a2b53d9f415d193179b3a4f2a41519db370e4a7151b46eb95b709d6bdc05f7
                                                                      • Instruction Fuzzy Hash: 451161B1B18A4A86FB149B25DC901B533E0AF54760F480239D96EE26F0EF2CE55D8304
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                      • String ID: csm$f
                                                                      • API String ID: 2395640692-629598281
                                                                      • Opcode ID: 086aeb89ba7506c75159e1eb5d45745d141201e07396e1855dd07762cfd4d523
                                                                      • Instruction ID: 60e629fe8fa3de7f3b9c791c6976ad2fbce526b29590009973dec2c1e1f793fa
                                                                      • Opcode Fuzzy Hash: 086aeb89ba7506c75159e1eb5d45745d141201e07396e1855dd07762cfd4d523
                                                                      • Instruction Fuzzy Hash: 3651D972A1970586DB15CF16E414A2937E6FB44B88F588131EE0EE774CEF78E845C708
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: memcpy_s
                                                                      • String ID: Failed to ensure buffer size.$Failed to get string size.$Failed to write string to buffer: '%ls', error: %d$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\buffutil.cpp
                                                                      • API String ID: 1502251526-4099103365
                                                                      • Opcode ID: dd7fa1b2b2b72873a7486e7ec9428b025126744e0b5eabf68f311e6f2c5cfe64
                                                                      • Instruction ID: 07d8eda4dcfe0d0036d688ebacb1a152d12664a2360b48342d0a81bb2d6ae2c0
                                                                      • Opcode Fuzzy Hash: dd7fa1b2b2b72873a7486e7ec9428b025126744e0b5eabf68f311e6f2c5cfe64
                                                                      • Instruction Fuzzy Hash: CB41D2B2B18B5BC6EB208F16E88057962A4FB95BC0F5C5136DE0DE3B94DE3CE5158700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: memcpy_s
                                                                      • String ID: Failed to ensure buffer size.$Failed to get string size.$Failed to write string to buffer: '%hs', error: %d$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\buffutil.cpp
                                                                      • API String ID: 1502251526-3750679403
                                                                      • Opcode ID: 0238bf193b6539d9e9d73b1e8e20575478c8a88195f2f66bdf14cccf388a0edc
                                                                      • Instruction ID: 1a1d576967379446ea209dc4a0688c0e0f4eb9a019e1e5489a5617826f21e7ea
                                                                      • Opcode Fuzzy Hash: 0238bf193b6539d9e9d73b1e8e20575478c8a88195f2f66bdf14cccf388a0edc
                                                                      • Instruction Fuzzy Hash: 4241E1B1B18B8AC5EB209F26E880579A7A5EF95BC0F5C5136DE4CE3B95DE3CD5058300
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CompareString
                                                                      • String ID: Failed dependents check on bundle.$Failed to detect provider key bundle id.$d:\a\wix4\wix4\src\burn\engine\dependency.cpp
                                                                      • API String ID: 1825529933-872169753
                                                                      • Opcode ID: 209f9745823d27a06de787e9e286e9e20dd26383dd689a435e27eee22fd124d2
                                                                      • Instruction ID: 146cb8d11fdf36c0dad2ac48ed3681ca0380948f547a3fe85a57e224e9602c1a
                                                                      • Opcode Fuzzy Hash: 209f9745823d27a06de787e9e286e9e20dd26383dd689a435e27eee22fd124d2
                                                                      • Instruction Fuzzy Hash: D3417F76608B45C6E7248F11E44056B77A4F7487A4F580339DAADD36A0DF38E569CB04
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: EventHeapMutexObjectProcessReleaseSingleWait
                                                                      • String ID: Failed to allocate buffer.$d:\a\wix4\wix4\src\burn\engine\netfxchainer.cpp
                                                                      • API String ID: 3023235355-1881421891
                                                                      • Opcode ID: 556f41dd4f3ca94d5e7a6eee109a7b49bdf945a2b9cc495b3c3d4134c070b406
                                                                      • Instruction ID: 6b541587bd3add58d21f604df84588392b6e8d6db6ddecd9b5f70af52149af53
                                                                      • Opcode Fuzzy Hash: 556f41dd4f3ca94d5e7a6eee109a7b49bdf945a2b9cc495b3c3d4134c070b406
                                                                      • Instruction Fuzzy Hash: 2B41DA72B24B88C2DB20CF12E884569B3E5FB88B80B594135DA5ED7750CF7DE809C708
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Failed to get full path for: %ls$Failed to get parent directory for path: %ls$Full path was not rooted: %ls$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\dirutil.cpp
                                                                      • API String ID: 0-281674368
                                                                      • Opcode ID: 6a1ff9a787268e86ce2580ab7aa86bafc4138252a5880f7ff1da44d68e4ee0ca
                                                                      • Instruction ID: 6edf0f824d03a95a8a541b2d1a8a0b6ca230365e3b984572ea38410db9b5487d
                                                                      • Opcode Fuzzy Hash: 6a1ff9a787268e86ce2580ab7aa86bafc4138252a5880f7ff1da44d68e4ee0ca
                                                                      • Instruction Fuzzy Hash: 3D319371718B5A8AEB609F65E8805B923A0FB84798F081135FA4EE7B58DF3CD455C700
                                                                      APIs
                                                                        • Part of subcall function 00007FF6570EA674: RegOpenKeyExW.KERNELBASE(?,?,?,?,?,?,00000000,00007FF6570EA66D), ref: 00007FF6570EA6C1
                                                                      • RegCloseKey.ADVAPI32 ref: 00007FF6570F7853
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CloseOpen
                                                                      • String ID: Failed to enumerate uninstall key for related bundles.$Failed to open uninstall registry key.$SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\butil.cpp
                                                                      • API String ID: 47109696-4270664815
                                                                      • Opcode ID: abfa968a3838170a03bcec5cb91691b2c04fb953a0e53dcfb26725f118cbfae8
                                                                      • Instruction ID: c35f6e6f5e208c92992694b9f127e348e47204c53843a81e2dd9fecbf5eeb399
                                                                      • Opcode Fuzzy Hash: abfa968a3838170a03bcec5cb91691b2c04fb953a0e53dcfb26725f118cbfae8
                                                                      • Instruction Fuzzy Hash: 1731C7B1B1864A8EFB208F65D8407B923D0FF48758F9C1235EA0DD6695DF2CE449C349
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Close
                                                                      • String ID: Failed to open registration key.$Failed to read Resume value.$Resume$d:\a\wix4\wix4\src\burn\engine\registration.cpp
                                                                      • API String ID: 3535843008-1502274520
                                                                      • Opcode ID: 6d96b4ee8feb5b249e36126e90173a7002c41484378594c74a9cb6aab087f8c7
                                                                      • Instruction ID: 987bd1de9d5e152c0b337e541d946fdfbec338605f2a7a0351889208d8afe2f2
                                                                      • Opcode Fuzzy Hash: 6d96b4ee8feb5b249e36126e90173a7002c41484378594c74a9cb6aab087f8c7
                                                                      • Instruction Fuzzy Hash: 5A313CB2F0C60B96FB208F64D99437B26E5EB64764F1C4035CA5ED7690DFADE8588700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLastLookupPrivilegeValue
                                                                      • String ID: Failed to get privilege LUID: %ls$Failed to get token privilege information.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\procutil.cpp
                                                                      • API String ID: 2626710698-2191672025
                                                                      • Opcode ID: 0f9ad4d970d9446047e9849770d53fd860c90eea085f753fc5579f6452419e5e
                                                                      • Instruction ID: ec9f1d814d28f484fbaece04ee1b4d1b62dca76308a1bf8b367ee39d76bd462f
                                                                      • Opcode Fuzzy Hash: 0f9ad4d970d9446047e9849770d53fd860c90eea085f753fc5579f6452419e5e
                                                                      • Instruction Fuzzy Hash: 96318DB2B1874A8AEF208B16E5803BD77A0EB44B50F484135DA4DD7B85DF3CE849C741
                                                                      APIs
                                                                        • Part of subcall function 00007FF657086828: GetProcessHeap.KERNEL32(?,?,00000000,00007FF657082158,?,?,?,?,?,?,00000000,00007FF657081F49,?,?,?,00000000), ref: 00007FF65708683C
                                                                      • CreateWellKnownSid.ADVAPI32(?,?,?,?,00000000,00007FF6570A22AD), ref: 00007FF6570A1237
                                                                      • GetLastError.KERNEL32(?,?,?,?,00000000,00007FF6570A22AD), ref: 00007FF6570A1241
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CreateErrorHeapKnownLastProcessWell
                                                                      • String ID: Failed to allocate memory for well known SID.$Failed to create well known SID.$d:\a\wix4\wix4\src\burn\engine\cache.cpp
                                                                      • API String ID: 2057720986-3368738088
                                                                      • Opcode ID: 2a7c194cf9e0d63946a12173f8ba8cb6ce4333da95bd6511e095d851b584356c
                                                                      • Instruction ID: 3c04496d52d25511b97264381c538f20c016acb69416f4688eaba31acfeae899
                                                                      • Opcode Fuzzy Hash: 2a7c194cf9e0d63946a12173f8ba8cb6ce4333da95bd6511e095d851b584356c
                                                                      • Instruction Fuzzy Hash: 3C31BF71B1CB0AC2E7209F15E8402A9A7E1BF88B90F4D4139DA4CE7751DF3CE5298B48
                                                                      APIs
                                                                      • WaitForMultipleObjects.KERNEL32(?,?,?,?,?,?,?,00007FF6570B76DD), ref: 00007FF6570817EA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: MultipleObjectsWait
                                                                      • String ID: Abandoned wait for multiple objects, index: %u.$Failed to wait for multiple objects.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\apputil.cpp
                                                                      • API String ID: 862713236-4067188417
                                                                      • Opcode ID: d08c2dc520f26964a74738974aea1c32f589d025185e562ae34312eab7a6ab98
                                                                      • Instruction ID: f230967b41545a25ee992432833ca1bb1d056c2fa08fb466a46658cbb046b88b
                                                                      • Opcode Fuzzy Hash: d08c2dc520f26964a74738974aea1c32f589d025185e562ae34312eab7a6ab98
                                                                      • Instruction Fuzzy Hash: AB31C1B1B18746C7E7108B65E8C13A922E1BF84740F68813AD64EE37A5EF3CE90D8745
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: __swprintf_l
                                                                      • String ID: 0x%08x$Failed to log id module.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\logutil.cpp$failed to format error code: "0%08x"
                                                                      • API String ID: 1488884202-2411163256
                                                                      • Opcode ID: ec2dbcaa49324bb4df1d8346dc2d76fa71f5df717952157a61f54c6b04fec048
                                                                      • Instruction ID: 96a208469465e677ca7dedcea3af55f69d19abffe34ff881ed2c5d50f70b54c5
                                                                      • Opcode Fuzzy Hash: ec2dbcaa49324bb4df1d8346dc2d76fa71f5df717952157a61f54c6b04fec048
                                                                      • Instruction Fuzzy Hash: C221B272718A8A96E720DF42F8405AA77A0FB88754F480136EE4CE3B95DF3CD549CB04
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: _cwprintf_s_l
                                                                      • String ID: Failed to combine completed path with engine file name for layout.$Failed to layout bundle from: '%ls' to '%ls'$Layout bundle from: '%ls' to: '%ls'$d:\a\wix4\wix4\src\burn\engine\cache.cpp
                                                                      • API String ID: 2941638530-2807656380
                                                                      • Opcode ID: 857c775585f62fc161abfb204963deb6b189b046421a73eab6c55891603ddffa
                                                                      • Instruction ID: e6fe2e83cb890f06cdd7eea4c25e49e5da58f099e5851dc60e08f470ce512121
                                                                      • Opcode Fuzzy Hash: 857c775585f62fc161abfb204963deb6b189b046421a73eab6c55891603ddffa
                                                                      • Instruction Fuzzy Hash: FC316172718B8582EB208F02E8807AA77A4FB88BC4F584135EA8DD7B59DF3DD515CB40
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Error 0x%x: %ls$Failed to convert format string to wide character string$Failed to format error message: "%ls"$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\logutil.cpp
                                                                      • API String ID: 0-3266531466
                                                                      • Opcode ID: 83ecfdb9184ed45ca9b88aabc5d8780fd81a3915cd7051c8fe6c1be028fa76f5
                                                                      • Instruction ID: 3e1a9928b5ccccfc82a8027726113d7ae008f2f1b07ef549d963130814d28703
                                                                      • Opcode Fuzzy Hash: 83ecfdb9184ed45ca9b88aabc5d8780fd81a3915cd7051c8fe6c1be028fa76f5
                                                                      • Instruction Fuzzy Hash: 4F217172B1C64A82EB20DF55E4407BA77A0FB89784F480135DA4CE7BA5DF2DD508CB00
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: FreeString
                                                                      • String ID: Already processed this value.$Failed to allocate value.$Failed to get value.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\atomutil.cpp
                                                                      • API String ID: 3341692771-474062544
                                                                      • Opcode ID: af4b3357bd25927f957d1befb003ebcfb3e3c8ab7444a466e72a168a40536013
                                                                      • Instruction ID: ad7738f71540c2f0d9e0615884ccb3350327c1175b74e917cac75d82f078b2f4
                                                                      • Opcode Fuzzy Hash: af4b3357bd25927f957d1befb003ebcfb3e3c8ab7444a466e72a168a40536013
                                                                      • Instruction Fuzzy Hash: C521D794B1C70A82FF219B59D98437963E5AF85380F5C0135DA4DD3795EF2DE40D8708
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: FolderPath
                                                                      • String ID: Failed to backslash terminate shell folder path: %ls$Failed to copy shell folder path: %ls$Failed to get folder path for CSIDL: %d$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\shelutil.cpp
                                                                      • API String ID: 1514166925-3657258693
                                                                      • Opcode ID: 60d10c7153b133880202fdfd95280996240e265f9bc5e10635a585a269809676
                                                                      • Instruction ID: 9ff6f5096680b98781507510a42955af0185e5fd022a6ea48e7270069a013ef9
                                                                      • Opcode Fuzzy Hash: 60d10c7153b133880202fdfd95280996240e265f9bc5e10635a585a269809676
                                                                      • Instruction Fuzzy Hash: 7321517672CB96C2EB208B15E49066A73A4FB89780F480132EE4DD7B55DF3DD505CB44
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: FreeString
                                                                      • String ID: Already process this datetime value.$Failed to convert value to time.$Failed to get value.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\atomutil.cpp
                                                                      • API String ID: 3341692771-3942955074
                                                                      • Opcode ID: d6328dcb6cac5bb95e5cf575abaa838cd10fe842309121f5116a0d7df6bae635
                                                                      • Instruction ID: ae24deed0036a027013dfee126f909f468a5f048fd6043b80a867ee3609fb2a3
                                                                      • Opcode Fuzzy Hash: d6328dcb6cac5bb95e5cf575abaa838cd10fe842309121f5116a0d7df6bae635
                                                                      • Instruction Fuzzy Hash: B521CDA1B1C74A86FF108B56E48433963E0AF85384F684135DA4DD7795EF3CE80ACB08
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ObjectSingleWait
                                                                      • String ID: Abandoned wait for single object.$Failed to wait for single object.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\apputil.cpp
                                                                      • API String ID: 24740636-2056904685
                                                                      • Opcode ID: b02d7eb3b48291a575e7f1eeb203afe4133c3a933711ec44571216533d81f05c
                                                                      • Instruction ID: e2bc142056a453282daed451153ed3e23eabce439b3cfa5765bafe4c633791bb
                                                                      • Opcode Fuzzy Hash: b02d7eb3b48291a575e7f1eeb203afe4133c3a933711ec44571216533d81f05c
                                                                      • Instruction Fuzzy Hash: A31152B0B28646C6F7505764D8817B522D2AF44350F68413EC98EE77E5DE2CE94D8348
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: InitializeUninitialize
                                                                      • String ID: Failed to initialize COM.$Failed to pump messages in child process.$d:\a\wix4\wix4\src\burn\engine\elevation.cpp
                                                                      • API String ID: 3442037557-3194279326
                                                                      • Opcode ID: 2a2ec3f6f6aa8a75c1a06ce23b38337df34f13b5095af95bb6c8f6563054ed1e
                                                                      • Instruction ID: b9f509f9dd3d129208133c8fed8a3ac1076ebeb243c88fab7ec5075774a9de20
                                                                      • Opcode Fuzzy Hash: 2a2ec3f6f6aa8a75c1a06ce23b38337df34f13b5095af95bb6c8f6563054ed1e
                                                                      • Instruction Fuzzy Hash: 95115475B1C64683E720CB11E4803AAB3A1FB88384F580136EA8DE7B59DF7DE5198B04
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                                      • String ID: CorExitProcess$mscoree.dll
                                                                      • API String ID: 4061214504-1276376045
                                                                      • Opcode ID: 5265be840e21db70880cc59d7614667791f263de245fb1a15ec7ee3cdf05792b
                                                                      • Instruction ID: 30d1f2450b6e7faa03b99a1eabd2c9b8d3c4a840e9376cd85e03e6b791c83785
                                                                      • Opcode Fuzzy Hash: 5265be840e21db70880cc59d7614667791f263de245fb1a15ec7ee3cdf05792b
                                                                      • Instruction Fuzzy Hash: E2F04FE1A1974A82EB109B24E45533963A0EF447A1F580239D66DE56F4CF2CE04DC304
                                                                      APIs
                                                                      • GetLastError.KERNEL32 ref: 00007FF6570A34EE
                                                                        • Part of subcall function 00007FF6570F5E0C: GetLastError.KERNEL32(?,?,?,?,?,00000000,?,00007FF6570A3412), ref: 00007FF6570F5E45
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast
                                                                      • String ID: Failed to find expected public key in certificate chain.$Failed to get certificate public key identifier.$Failed to read certificate thumbprint.$d:\a\wix4\wix4\src\burn\engine\cache.cpp
                                                                      • API String ID: 1452528299-112932794
                                                                      • Opcode ID: 24d6679d64d6024c27e7c6c6bafcb3b50d8235ac8a567648522d7445d89b5877
                                                                      • Instruction ID: 903f056816edb1cf6b00a8c2e45027c7c99b271618dad774ddfcabd9af2d5e69
                                                                      • Opcode Fuzzy Hash: 24d6679d64d6024c27e7c6c6bafcb3b50d8235ac8a567648522d7445d89b5877
                                                                      • Instruction Fuzzy Hash: F7517B72B18B068AEB50CF62D8802AD67E4FB48B98F484136DE4DE7B54DF78E4598704
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: HeapProcess
                                                                      • String ID: %lu.%lu.%lu.%lu$Failed to allocate and format the version string.$Failed to allocate memory for Verutil version from QWORD.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\verutil.cpp
                                                                      • API String ID: 54951025-3295944732
                                                                      • Opcode ID: 9633d0f383244bcbde40bd51c41daad63d31851f17d771de66226f27fbd05766
                                                                      • Instruction ID: 08a84e4b3628fb350ed4a84ad5b70ab7f8a877b9e8073baa9d63b499247cdaf5
                                                                      • Opcode Fuzzy Hash: 9633d0f383244bcbde40bd51c41daad63d31851f17d771de66226f27fbd05766
                                                                      • Instruction Fuzzy Hash: 2631A3B2B08749C6DB24CF16E8400A9B7E4FB88794B58413ADA4DD3759DF3CD545CB44
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast
                                                                      • String ID: Failed to get content length string for internet file handle$Failed to parse size for internet file handle: %ls$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\inetutil.cpp
                                                                      • API String ID: 1452528299-1743952032
                                                                      • Opcode ID: 53b5b989afbbe1a8090f54c21baaeb60bd149fab1520ee2149d2a180024078c5
                                                                      • Instruction ID: 688bc858afd2bc8f7caa3dea5ee10b13d4fad92e05b9c541f67f4ca7f810f5ca
                                                                      • Opcode Fuzzy Hash: 53b5b989afbbe1a8090f54c21baaeb60bd149fab1520ee2149d2a180024078c5
                                                                      • Instruction Fuzzy Hash: 5F21B2B1B18B4AC2E7109B62E8802AA73A5FF84750F480136DA4ED3B95DF3CE519C748
                                                                      APIs
                                                                      • EnterCriticalSection.KERNEL32(?,?,?,?,?,00007FF6570B8920), ref: 00007FF6570D1E61
                                                                      • LeaveCriticalSection.KERNEL32(?,?,?,?,?,00007FF6570B8920), ref: 00007FF6570D1EF7
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalSection$EnterLeave
                                                                      • String ID: Engine is active, cannot change engine state.$Failed to set feed download URL.$d:\a\wix4\wix4\src\burn\engine\externalengine.cpp
                                                                      • API String ID: 3168844106-105427012
                                                                      • Opcode ID: 95fe6d35b8dc779d8a2aca135ee43d456ef53feef04488036ac1094bb4f4b8f8
                                                                      • Instruction ID: 9b31d0fcaff5cf689db7d1fab3482bca7568620a8d1eb214ff59ab4875c1d637
                                                                      • Opcode Fuzzy Hash: 95fe6d35b8dc779d8a2aca135ee43d456ef53feef04488036ac1094bb4f4b8f8
                                                                      • Instruction Fuzzy Hash: 8321A165B18B9687EB259F12E4402B9A3A4FF88B84F4D4131DE4CE3B91DF3CE55A8304
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalSection$EnterLeave
                                                                      • String ID: Failed to get value as version for variable: %ls$Failed to get value of variable: %ls$d:\a\wix4\wix4\src\burn\engine\variable.cpp
                                                                      • API String ID: 3168844106-1616145386
                                                                      • Opcode ID: c1432041acffda1ce24f51658353c6afcff43e34905e735428815f3fdc33d8e7
                                                                      • Instruction ID: dbaa5aba4e0c3ced4ec4913a51ddab4eceb0ea37bb58f8d87aff5dd18bff5862
                                                                      • Opcode Fuzzy Hash: c1432041acffda1ce24f51658353c6afcff43e34905e735428815f3fdc33d8e7
                                                                      • Instruction Fuzzy Hash: 9221D2A1B08B4AC6FB109B01E48436A67A0FB88BA4F4C4275DE4DE7795DF7CE549C740
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalSection$EnterLeave
                                                                      • String ID: Failed to get value as string for variable: %ls$Failed to get value of variable: %ls$d:\a\wix4\wix4\src\burn\engine\variable.cpp
                                                                      • API String ID: 3168844106-1150034902
                                                                      • Opcode ID: 2eb73b23d6ae166411412550206dbc74be1a42241587657663f1bec5297220d1
                                                                      • Instruction ID: e590a1eba3a753cbe7932b01c6f6a6e7199514959f68abd4a635218fe970c79c
                                                                      • Opcode Fuzzy Hash: 2eb73b23d6ae166411412550206dbc74be1a42241587657663f1bec5297220d1
                                                                      • Instruction Fuzzy Hash: 4A119DB1B08B4AC6EB10DB02E88426A67A0FB88BD4F1C4135DA4DE7B95CF7DE549C700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalSection$EnterLeave
                                                                      • String ID: Failed to get value as numeric for variable: %ls$Failed to get value of variable: %ls$d:\a\wix4\wix4\src\burn\engine\variable.cpp
                                                                      • API String ID: 3168844106-1964378859
                                                                      • Opcode ID: 2607b6bd303937cd258ed415a5af3f34781557be8cf994a9684afc9b0ee7b010
                                                                      • Instruction ID: b885a981cbcb174a50e7e1127fdea4dbeb5c1117dd25dc0c7d5b29f8440c98f5
                                                                      • Opcode Fuzzy Hash: 2607b6bd303937cd258ed415a5af3f34781557be8cf994a9684afc9b0ee7b010
                                                                      • Instruction Fuzzy Hash: 3D11AFF1B08B5686EB109B02E88437A67A0FB88BE4F184135DA4DE7B55CF7CE559C704
                                                                      APIs
                                                                      • FlsGetValue.KERNEL32(?,?,?,00007FF6570DA3BB,?,?,00000000,00007FF6570DA656,?,?,?,?,?,00007FF6570DA5E2), ref: 00007FF6570DE39F
                                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF6570DA3BB,?,?,00000000,00007FF6570DA656,?,?,?,?,?,00007FF6570DA5E2), ref: 00007FF6570DE3BE
                                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF6570DA3BB,?,?,00000000,00007FF6570DA656,?,?,?,?,?,00007FF6570DA5E2), ref: 00007FF6570DE3E6
                                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF6570DA3BB,?,?,00000000,00007FF6570DA656,?,?,?,?,?,00007FF6570DA5E2), ref: 00007FF6570DE3F7
                                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF6570DA3BB,?,?,00000000,00007FF6570DA656,?,?,?,?,?,00007FF6570DA5E2), ref: 00007FF6570DE408
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Value
                                                                      • String ID:
                                                                      • API String ID: 3702945584-0
                                                                      • Opcode ID: f302dbae5d0bc6288c9314cf8b6c221561df70a0060d62d4ab23de99c67f51b9
                                                                      • Instruction ID: 982972a83ea76fdc00ef72b5a19e34151ca5541aa66a04bb9ae16e6e55ecfd54
                                                                      • Opcode Fuzzy Hash: f302dbae5d0bc6288c9314cf8b6c221561df70a0060d62d4ab23de99c67f51b9
                                                                      • Instruction Fuzzy Hash: 9811AFA0E0874B82FF68A731A54513A21C26F847B4F5C4334F97EE66D6DE7CF44A8208
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Value
                                                                      • String ID:
                                                                      • API String ID: 3702945584-0
                                                                      • Opcode ID: 92d4853f9bbdd39c811b8a8b46b0882b8177f75986b6b915a0c50430598f6381
                                                                      • Instruction ID: 5d8c54e9876b4a061e661b413e3c60248d4e4015eb4de3a95944556db1cca6e8
                                                                      • Opcode Fuzzy Hash: 92d4853f9bbdd39c811b8a8b46b0882b8177f75986b6b915a0c50430598f6381
                                                                      • Instruction Fuzzy Hash: CE113C90E0830F82FF68A771941267A12C15F85374F5C0B38E93DEA2D3ED3CB4494208
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalSection$EnterLeave
                                                                      • String ID: Failed to copy value of variable: %ls$Failed to get value of variable: %ls$d:\a\wix4\wix4\src\burn\engine\variable.cpp
                                                                      • API String ID: 3168844106-3684767681
                                                                      • Opcode ID: dcc9417831fc31315e82519a02b7561bb6554119f6288cd935556dffc3b18f1a
                                                                      • Instruction ID: d3714784d26009914174b6fed9cf2ff3777767e54714f97e7195909db2642a34
                                                                      • Opcode Fuzzy Hash: dcc9417831fc31315e82519a02b7561bb6554119f6288cd935556dffc3b18f1a
                                                                      • Instruction Fuzzy Hash: 12119EA1B18B8686EB10DB12E88426A67A4FB88BD0F084135EE8DD7B55DF7CE559C700
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CloseHandle$FileUnmapView
                                                                      • String ID:
                                                                      • API String ID: 260491571-0
                                                                      • Opcode ID: 1b98caab4a36da19b52b209f3163e47852b678859b0a5da766c622f73ea9f467
                                                                      • Instruction ID: 5b3d631fd5766ca7bbda5dc72227131413828f95a1c9522a7f215f65e08b65a1
                                                                      • Opcode Fuzzy Hash: 1b98caab4a36da19b52b209f3163e47852b678859b0a5da766c622f73ea9f467
                                                                      • Instruction Fuzzy Hash: 8801D6AAA0AA4A86FF699FA1D86533863A0EF44F44F0C4534C90EDA154DF7CE4588298
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                      • String ID: csm$csm
                                                                      • API String ID: 3896166516-3733052814
                                                                      • Opcode ID: 4d9676954442bf96d237a56c501979dc03a8134797853d3bb2f8187c96ed76f3
                                                                      • Instruction ID: 51edee9cbd69cce32fc6849cbe024254f14528c2e21ae142737ab4897557264b
                                                                      • Opcode Fuzzy Hash: 4d9676954442bf96d237a56c501979dc03a8134797853d3bb2f8187c96ed76f3
                                                                      • Instruction Fuzzy Hash: FB5192B690834A8AEB348F25944427876E0EB44B94F186235DB9CE7BD5CF3CE459CB48
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CompareString
                                                                      • String ID: Failed to hash the string.$Invalid dictionary - bucket size index is out of range$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\dictutil.cpp
                                                                      • API String ID: 1825529933-1798595610
                                                                      • Opcode ID: b21b11f71abef4484a5c858234bd56fe1f08b4f546422d009895f67449168a1c
                                                                      • Instruction ID: 54f52c389e7ac4950a91f1c754ce7ec5ff1042dc836797adad10c3492c43299c
                                                                      • Opcode Fuzzy Hash: b21b11f71abef4484a5c858234bd56fe1f08b4f546422d009895f67449168a1c
                                                                      • Instruction Fuzzy Hash: 533182B2A08B46C6EB10CF06E48056DB7A0FB88B64F584235DA5DD77A0CF3DE856C704
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Close
                                                                      • String ID: Failed to open policy key: %ls$Failed to open policy key: %ls, name: %ls$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\polcutil.cpp
                                                                      • API String ID: 3535843008-3938230626
                                                                      • Opcode ID: d973429e640475dbb90c0a1eff05d2deba26d9ef3adbe27ff8f935dd0b2eb6e8
                                                                      • Instruction ID: ccf78d1753bfda447d52e22d104200c4a8e47f12bc49c4e9194e519290d48789
                                                                      • Opcode Fuzzy Hash: d973429e640475dbb90c0a1eff05d2deba26d9ef3adbe27ff8f935dd0b2eb6e8
                                                                      • Instruction Fuzzy Hash: 243172B271C74A86EB218F52E4806A973A8FB88B90F584239DB4DD3750DF3CE959C704
                                                                      APIs
                                                                        • Part of subcall function 00007FF6570F85F8: lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,?), ref: 00007FF6570F870E
                                                                        • Part of subcall function 00007FF6570F85F8: lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,?), ref: 00007FF6570F872F
                                                                      • GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6570F9155), ref: 00007FF6570F83C7
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Timelstrlen$FileSystem
                                                                      • String ID: Failed to connect to URL: %ls$HEAD$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\dlutil.cpp
                                                                      • API String ID: 3954044709-1251758901
                                                                      • Opcode ID: 195a85674bb04444b13010bc2e7cc85395699d1c0fcdb0906663edb84740c2e5
                                                                      • Instruction ID: 0a1cd5f15d9141a4632108695ced7e638ba454539e7f0cc7c590a9233f468ba7
                                                                      • Opcode Fuzzy Hash: 195a85674bb04444b13010bc2e7cc85395699d1c0fcdb0906663edb84740c2e5
                                                                      • Instruction Fuzzy Hash: 5531367270CB8A85DB20CF12E8841AD73A4FB88B80F590136DA9DD7B64DF39D958C744
                                                                      APIs
                                                                      • ReadFile.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00009002), ref: 00007FF6570F28AB
                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00009002), ref: 00007FF6570F28B5
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFileLastRead
                                                                      • String ID: Failed to read data from file handle.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\fileutil.cpp
                                                                      • API String ID: 1948546556-2736598211
                                                                      • Opcode ID: d725aed0b7f6d72eca70223a0333dc4b9cadb5037894a78989eac7f154f13a73
                                                                      • Instruction ID: 6998b677ffc2daabb295c9994e2199d659e1564c6a3e04679888c083ceda60ea
                                                                      • Opcode Fuzzy Hash: d725aed0b7f6d72eca70223a0333dc4b9cadb5037894a78989eac7f154f13a73
                                                                      • Instruction Fuzzy Hash: 7921C572B08B9986E720DF56E840669A7E0FB84BA0F480235DE4CD3794DF3CE54AC704
                                                                      APIs
                                                                        • Part of subcall function 00007FF6570EA674: RegOpenKeyExW.KERNELBASE(?,?,?,?,?,?,00000000,00007FF6570EA66D), ref: 00007FF6570EA6C1
                                                                      • RegCloseKey.ADVAPI32 ref: 00007FF6570EB5D8
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CloseOpen
                                                                      • String ID: Failed to open key: %ls$Failed to read value type: %ls/@%ls$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\regutil.cpp
                                                                      • API String ID: 47109696-3852982929
                                                                      • Opcode ID: 7e0f4dc421d206c0b62ae5bae23aba5848e9f73f7f7c3a181bc54c62559296f1
                                                                      • Instruction ID: cad7c52a54cb83ca7fa82ccdddf5c71413f652686bae7a224ee6521b5e1a5117
                                                                      • Opcode Fuzzy Hash: 7e0f4dc421d206c0b62ae5bae23aba5848e9f73f7f7c3a181bc54c62559296f1
                                                                      • Instruction Fuzzy Hash: B5215E72B0874A86EB209B01F48176976E0FB85B90F580235EA4DD7B95DF3DE948CB00
                                                                      APIs
                                                                      • WaitForSingleObject.KERNEL32(?,?,?,?,?,00007FF6570D3604), ref: 00007FF6570D32F6
                                                                      • ReleaseMutex.KERNEL32(?,?,?,?,?,00007FF6570D3604), ref: 00007FF6570D33A5
                                                                        • Part of subcall function 00007FF657086828: GetProcessHeap.KERNEL32(?,?,00000000,00007FF657082158,?,?,?,?,?,?,00000000,00007FF657081F49,?,?,?,00000000), ref: 00007FF65708683C
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: HeapMutexObjectProcessReleaseSingleWait
                                                                      • String ID: Failed to allocate memory for message data$d:\a\wix4\wix4\src\burn\engine\netfxchainer.cpp
                                                                      • API String ID: 1927941271-954368992
                                                                      • Opcode ID: c654562947861c8fe8a31c9448c68e3616df2fbd3b986bb2c51ff1e735ed6fea
                                                                      • Instruction ID: 88f90b4a38b111c00331e77a4424c3ba58b34206a778944198f0d379091b35b6
                                                                      • Opcode Fuzzy Hash: c654562947861c8fe8a31c9448c68e3616df2fbd3b986bb2c51ff1e735ed6fea
                                                                      • Instruction Fuzzy Hash: FB2148B6704B54C2E710CF12E440269BBA0FB88F90F498635EB4C97B95DF39E429CB44
                                                                      APIs
                                                                        • Part of subcall function 00007FF6570EA674: RegOpenKeyExW.KERNELBASE(?,?,?,?,?,?,00000000,00007FF6570EA66D), ref: 00007FF6570EA6C1
                                                                      • RegCloseKey.ADVAPI32 ref: 00007FF6570EA642
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CloseOpen
                                                                      • String ID: Failed to open key: %ls$Failed to read value: %ls/@%ls$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\regutil.cpp
                                                                      • API String ID: 47109696-2566192520
                                                                      • Opcode ID: 3b130d45959f5c6743606b870a15f0967d14906804007f36e1cfbab80d00caa5
                                                                      • Instruction ID: 0006d9b4aac8d59c004d13f95a380a8b7a041ae0c60f937d7185502d24e8d05d
                                                                      • Opcode Fuzzy Hash: 3b130d45959f5c6743606b870a15f0967d14906804007f36e1cfbab80d00caa5
                                                                      • Instruction Fuzzy Hash: D92171B2B1879A85EB209B01E4842BD72E4FB89790F580239DA4DE3B95DF3DD949C700
                                                                      APIs
                                                                        • Part of subcall function 00007FF6570F2798: FindFirstFileW.KERNEL32 ref: 00007FF6570F27DE
                                                                        • Part of subcall function 00007FF6570F2798: FindClose.KERNEL32 ref: 00007FF6570F27ED
                                                                      • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,00007FF6570CBD3B,?,?,?,?,00000000,00000000,?,00007FF6570CECC6), ref: 00007FF6570CF2FE
                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,00007FF6570CBD3B,?,?,?,?,00000000,00000000,?,00007FF6570CECC6), ref: 00007FF6570CF308
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: FileFind$AttributesCloseErrorFirstLast
                                                                      • String ID: Failed to clear readonly bit on payload destination path: %ls$d:\a\wix4\wix4\src\burn\engine\apply.cpp
                                                                      • API String ID: 1980345056-600630982
                                                                      • Opcode ID: 307c8b9bc2cc2462c9feeea8b47fff988392d13b030302f8740b76046eb824d5
                                                                      • Instruction ID: 4be9196c00600ba0b5cbc4dfb6616c5cc5f8daa6a52f13e5a70baafbca8191bf
                                                                      • Opcode Fuzzy Hash: 307c8b9bc2cc2462c9feeea8b47fff988392d13b030302f8740b76046eb824d5
                                                                      • Instruction Fuzzy Hash: FB11D5F2B0874682E7109B55E98026AB7E8EF94BE0F580136D94DD7394CF7CE8488754
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: InitializeUninitialize
                                                                      • String ID: Failed to initialize COM on cache thread.$d:\a\wix4\wix4\src\burn\engine\core.cpp
                                                                      • API String ID: 3442037557-102543622
                                                                      • Opcode ID: b12ce03a8c121ae674c7b9beede6cb57c4867d743a30035a42eefaf89a64d3af
                                                                      • Instruction ID: 265b82324a78ffbaacf6d6fa183290c03af26c6b5fe2ec0281bbb1a85f03e237
                                                                      • Opcode Fuzzy Hash: b12ce03a8c121ae674c7b9beede6cb57c4867d743a30035a42eefaf89a64d3af
                                                                      • Instruction Fuzzy Hash: 4A116A72B08B8A86D764CF22E4401AAB3A0F788B94F484132DF8DD3755CF38E569C744
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: String$AllocFree
                                                                      • String ID: d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\xmlutil.cpp$failed SysAllocString
                                                                      • API String ID: 344208780-608482133
                                                                      • Opcode ID: f0480deedfbd0f0703d6dd9f65a9d56f3cbef12a1d339df6ab43f0eb338fe897
                                                                      • Instruction ID: 4b01f9e835cf0e475472c6478362238598f4f27c1ec7fcb3af65d9b72cf34d4c
                                                                      • Opcode Fuzzy Hash: f0480deedfbd0f0703d6dd9f65a9d56f3cbef12a1d339df6ab43f0eb338fe897
                                                                      • Instruction Fuzzy Hash: 4A118CA5B1878EC2EB10CB16E9401B963A1AF89BD0B5C4135CE4DE3B65DF3CE55A8704
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentErrorLastLookupPrivilegeProcessValue
                                                                      • String ID: Failed to check if process token has privilege: %ls.$Failed to set variant value.$d:\a\wix4\wix4\src\burn\engine\variable.cpp
                                                                      • API String ID: 3865200005-2747678004
                                                                      • Opcode ID: 1be94d98c973188314bce5df5c29b0b9420840484a4c192c0a51e56afc0ed3c2
                                                                      • Instruction ID: 56e3e49483ee17524aac0b20df02311f86b44cc8373919c5140a9968a3ef189b
                                                                      • Opcode Fuzzy Hash: 1be94d98c973188314bce5df5c29b0b9420840484a4c192c0a51e56afc0ed3c2
                                                                      • Instruction Fuzzy Hash: DD115471B0CB8682EB10DB41F48026AA7A4FB487D4F484139EA8CD7B99DFBCD119CB40
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFileLastSize
                                                                      • String ID: Failed to get size of file.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\fileutil.cpp
                                                                      • API String ID: 464720113-3816715765
                                                                      • Opcode ID: 5ebdf16604ac2e6e306c0d264ed995e62e7b71d363c7acebbf840bd6e1ed392f
                                                                      • Instruction ID: b1bfab681a8a90f4676b0a0d77723afb4c0ba072b5fcbce469387c2a61f72daa
                                                                      • Opcode Fuzzy Hash: 5ebdf16604ac2e6e306c0d264ed995e62e7b71d363c7acebbf840bd6e1ed392f
                                                                      • Instruction Fuzzy Hash: E3017572B08B45C6EB109F1AE8901B973E5AF887A0F5C403ADA4ED7764DE3CD5598708
                                                                      APIs
                                                                      • GetCurrentProcess.KERNEL32 ref: 00007FF65708B069
                                                                        • Part of subcall function 00007FF6570E95E8: GetModuleHandleW.KERNEL32(?,?,?,?,?,00007FF65708B07C), ref: 00007FF6570E960E
                                                                        • Part of subcall function 00007FF6570E95E8: GetProcAddress.KERNEL32(?,?,?,?,?,00007FF65708B07C), ref: 00007FF6570E961E
                                                                        • Part of subcall function 00007FF6570E95E8: GetLastError.KERNEL32(?,?,?,?,?,00007FF65708B07C), ref: 00007FF6570E9645
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: AddressCurrentErrorHandleLastModuleProcProcess
                                                                      • String ID: Failed to get native machine value.$Failed to set variant value.$d:\a\wix4\wix4\src\burn\engine\variable.cpp
                                                                      • API String ID: 896058289-3337725491
                                                                      • Opcode ID: 6b9a3f1191d9a0b80a97dc97a495c8f92b32eb4ef93ffa72da7dd6093c9789fc
                                                                      • Instruction ID: 1c1fad4f98c23d7a653c7b0a0016e2f54b1b2d95f83aea5c1a82caa65ddf5aac
                                                                      • Opcode Fuzzy Hash: 6b9a3f1191d9a0b80a97dc97a495c8f92b32eb4ef93ffa72da7dd6093c9789fc
                                                                      • Instruction Fuzzy Hash: CD01D661B1CA9682EB10DB55E48056BA3A0FF84790F480135EE9CD3759EF6CE1098B01
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: AddressErrorFreeLastLibraryProc
                                                                      • String ID: BootstrapperApplicationDestroy
                                                                      • API String ID: 1144718084-3186005537
                                                                      • Opcode ID: 8040c1b8992b840429c8a18cfd7bbb8d9c305637a9c14a98cd9402716d6c778d
                                                                      • Instruction ID: 8843966db301ad44c24252441444e2018de8f8e21bc0c281d2ffdcffbbbed2e7
                                                                      • Opcode Fuzzy Hash: 8040c1b8992b840429c8a18cfd7bbb8d9c305637a9c14a98cd9402716d6c778d
                                                                      • Instruction Fuzzy Hash: BB0180B2A2868687EB408F15E48423973F0FB94B44F484135E74EC7554EF3CE899C700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: AddressErrorFreeLastLibraryProc
                                                                      • String ID: BundleExtensionDestroy
                                                                      • API String ID: 1144718084-3206861012
                                                                      • Opcode ID: 834f6dbf132107654f54383a4784ef038e404e45486db7456822bee6f463f941
                                                                      • Instruction ID: 28fc5c99ef002ec99d9bfb891a1f01f287e3d1b0667480c6b78eeee0b764b973
                                                                      • Opcode Fuzzy Hash: 834f6dbf132107654f54383a4784ef038e404e45486db7456822bee6f463f941
                                                                      • Instruction Fuzzy Hash: 24015B72A19A45D6EB019F22E84132973E0FB84F88F0C8535D65EE3658CF3CE59ACB04
                                                                      APIs
                                                                      • SetEvent.KERNEL32(?,?,?,?,00000000,00007FF6570B791A,?,?,?,?,00000000,00007FF657091526), ref: 00007FF6570B657D
                                                                      • GetLastError.KERNEL32(?,?,?,?,00000000,00007FF6570B791A,?,?,?,?,00000000,00007FF657091526), ref: 00007FF6570B6587
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorEventLast
                                                                      • String ID: Failed to set begin operation event.$d:\a\wix4\wix4\src\burn\engine\cabextract.cpp
                                                                      • API String ID: 3848097054-3005980414
                                                                      • Opcode ID: a7294b9593fcab44abb805d8fe2cba3e8d723f3810056adfe15ffc8dbc12cdf7
                                                                      • Instruction ID: 451bca4dffa692c6dee1a565574f088b95f5dcd4c63bbe49e91da451b55a4f29
                                                                      • Opcode Fuzzy Hash: a7294b9593fcab44abb805d8fe2cba3e8d723f3810056adfe15ffc8dbc12cdf7
                                                                      • Instruction Fuzzy Hash: B201A9A0B1870986F7109F65F8C06B923D4AF58B50F4C0135DD4ED76A1DE2CF6198714
                                                                      APIs
                                                                      • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,00007FF6570E4683,00000000), ref: 00007FF6570E47B4
                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,00007FF6570E4683,00000000), ref: 00007FF6570E483F
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ConsoleErrorLastMode
                                                                      • String ID:
                                                                      • API String ID: 953036326-0
                                                                      • Opcode ID: 9b93c8684649af2708d4c6c5d59f2dd9f1a1ee6e4cfe314bb53aca832c78c319
                                                                      • Instruction ID: 9da9382987b63a25c1a04aee5ed747b1fe097ff1af45cb05f2d053f0830b49bb
                                                                      • Opcode Fuzzy Hash: 9b93c8684649af2708d4c6c5d59f2dd9f1a1ee6e4cfe314bb53aca832c78c319
                                                                      • Instruction Fuzzy Hash: 1E91A2A2F0869F85F7A08F6594806BD2BE0AB45B88F5C4139FE4EF7684DE38D449C700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CloseErrorHandleLast
                                                                      • String ID: ShellExecEx failed with return code: %d$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\shelutil.cpp
                                                                      • API String ID: 918212764-2133313566
                                                                      • Opcode ID: e69d4f336506fcaea0130c40c91e290d7fdbec3ace6dceecfb2f055259f037db
                                                                      • Instruction ID: fe72146fe40cb16127f3060336a460d14eb6620fe5f3583718c3783ad54318d3
                                                                      • Opcode Fuzzy Hash: e69d4f336506fcaea0130c40c91e290d7fdbec3ace6dceecfb2f055259f037db
                                                                      • Instruction Fuzzy Hash: 30413876B25B458AEB20CF65E8406A933E5FB48B88F190135DE4DE3B54DF38D81AC744
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalSection$EnterLeave
                                                                      • String ID: Failed to get visibility of variable: %ls$d:\a\wix4\wix4\src\burn\engine\variable.cpp
                                                                      • API String ID: 3168844106-1405185440
                                                                      • Opcode ID: 3157d9cadce27a172ff07b2d371a0fb2d835f1df5e09024e0b736305642b4d71
                                                                      • Instruction ID: a258859af165ead436bf96c4a51008cb2ffa174ddba6ad6119ec4d820e033d73
                                                                      • Opcode Fuzzy Hash: 3157d9cadce27a172ff07b2d371a0fb2d835f1df5e09024e0b736305642b4d71
                                                                      • Instruction Fuzzy Hash: 46119EB2A18B96C6E7109F02E48026A77A0FB98F90F484139DB4DD3B54CF7CE55AC744
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalSection$EnterErrorEventLastLeave
                                                                      • String ID:
                                                                      • API String ID: 2851136515-0
                                                                      • Opcode ID: c562eb490bc41f483973d55a8e6c4b438559ecbcf11e53de4dd64529f6b988b5
                                                                      • Instruction ID: 857a97de4f5605597d0a143619799632643a8f6f01a476ab04989020b93b729e
                                                                      • Opcode Fuzzy Hash: c562eb490bc41f483973d55a8e6c4b438559ecbcf11e53de4dd64529f6b988b5
                                                                      • Instruction Fuzzy Hash: 22F012D171894782EB146B66E99493963A0EF49BD4F485030DA0ED7655DE2CF4988704
                                                                      APIs
                                                                      • _invalid_parameter_noinfo.LIBCMT ref: 00007FF6570DB0DA
                                                                        • Part of subcall function 00007FF6570DC91C: HeapFree.KERNEL32(?,?,00000000,00007FF6570E0212,?,?,?,00007FF6570E024F,?,?,00000000,00007FF6570E0749,?,?,?,00007FF6570E067B), ref: 00007FF6570DC932
                                                                        • Part of subcall function 00007FF6570DC91C: GetLastError.KERNEL32(?,?,00000000,00007FF6570E0212,?,?,?,00007FF6570E024F,?,?,00000000,00007FF6570E0749,?,?,?,00007FF6570E067B), ref: 00007FF6570DC93C
                                                                      • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF6570D3BC5), ref: 00007FF6570DB0F8
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFileFreeHeapLastModuleName_invalid_parameter_noinfo
                                                                      • String ID: C:\Users\user\Desktop\VmjvNTbD5J.exe
                                                                      • API String ID: 3580290477-1075079528
                                                                      • Opcode ID: dc28049cd6b234c3fc6132be077034b75c04e15d0a5f963cd9a2e0be23ef2459
                                                                      • Instruction ID: cbb0b31be953d4a97e05c386aa585f51854914143fd11125f31d4a1effb59dc1
                                                                      • Opcode Fuzzy Hash: dc28049cd6b234c3fc6132be077034b75c04e15d0a5f963cd9a2e0be23ef2459
                                                                      • Instruction Fuzzy Hash: 40416EB6A0875A89EB14AF25A8810BD76E5EF44BD4B4C4035EA4EE3B45DF3CE9498304
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFileLastWrite
                                                                      • String ID: U
                                                                      • API String ID: 442123175-4171548499
                                                                      • Opcode ID: 241ae4cb15b864cda83524f68f3b7dc5ff12d7398406e8703363b57b10766c99
                                                                      • Instruction ID: cc754094dd44b017d9b6a6c496cd5a1c70d9b5117c46a9e0273260d7431ad1f5
                                                                      • Opcode Fuzzy Hash: 241ae4cb15b864cda83524f68f3b7dc5ff12d7398406e8703363b57b10766c99
                                                                      • Instruction Fuzzy Hash: 9141C3A2B18A8A81DB60CF25E4443A977A0FB88794F594031FE4DD7B98DF7CE445C740
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CompareString
                                                                      • String ID: Failed to add chained patch.$d:\a\wix4\wix4\src\burn\engine\mspengine.cpp
                                                                      • API String ID: 1825529933-1868150798
                                                                      • Opcode ID: eb28502aaf13a03f912d075f369a35390b49c81a9de07fdc5edd64d39a0e62cb
                                                                      • Instruction ID: 9f23290c5f6041af318751be280220312cac61f4f4f7c4845b7e93332073619e
                                                                      • Opcode Fuzzy Hash: eb28502aaf13a03f912d075f369a35390b49c81a9de07fdc5edd64d39a0e62cb
                                                                      • Instruction Fuzzy Hash: 763138B2B14A4596E724CF19E880AADB7A4F744794F584136DE5DE3BA0CF3CE496C700
                                                                      APIs
                                                                        • Part of subcall function 00007FF6570EA674: RegOpenKeyExW.KERNELBASE(?,?,?,?,?,?,00000000,00007FF6570EA66D), ref: 00007FF6570EA6C1
                                                                      • RegCloseKey.ADVAPI32 ref: 00007FF6570F7728
                                                                      Strings
                                                                      • d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\butil.cpp, xrefs: 00007FF6570F76C1
                                                                      • Failed to open uninstall key for potential related bundle: %ls, xrefs: 00007FF6570F76B0
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CloseOpen
                                                                      • String ID: Failed to open uninstall key for potential related bundle: %ls$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\butil.cpp
                                                                      • API String ID: 47109696-3466351475
                                                                      • Opcode ID: 43c684ff03948c721dc28f214240550a10515e6c4d13b73b4854f953ffc7e857
                                                                      • Instruction ID: ff3df488af2abc208c2fc3cdc834204ea4a6216dc959626eda3f34bb87bf4c0f
                                                                      • Opcode Fuzzy Hash: 43c684ff03948c721dc28f214240550a10515e6c4d13b73b4854f953ffc7e857
                                                                      • Instruction Fuzzy Hash: 533157B6B14B558AE710CF62E8406AD37A0FB48B98F484135EE4DA3B18DF38D515CB00
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: Message$ErrorFormatFreeLastLocal
                                                                      • String ID: Failed to allocate string to display error message$d:\a\wix4\wix4\src\burn\engine\splashscreen.cpp
                                                                      • API String ID: 2195691534-719764090
                                                                      • Opcode ID: 09451a68cb9bba779cb9ec40a3cf89021201b6ca1d4afd7175b65764d0b6e864
                                                                      • Instruction ID: 4c83f30b221e3ecf0d693f835543502ff2a37ce2cb8cdc0e98dd43e783c997a0
                                                                      • Opcode Fuzzy Hash: 09451a68cb9bba779cb9ec40a3cf89021201b6ca1d4afd7175b65764d0b6e864
                                                                      • Instruction Fuzzy Hash: 4C11E1B2F0865582E7208B56E45077E73A0FB48BC0FA84136EA4DE7B55DF3DEA498700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CompareStringlstrlen
                                                                      • String ID: burn.clean.room
                                                                      • API String ID: 1433953587-3055529264
                                                                      • Opcode ID: ad14d0f9418f693a815ad40dc2e2055b593c211d88fb7df31a6088137c986642
                                                                      • Instruction ID: 17e869f797b187ef00126952eae9b83a399cce2c44b3a6dafdf0b7fb8a0da19c
                                                                      • Opcode Fuzzy Hash: ad14d0f9418f693a815ad40dc2e2055b593c211d88fb7df31a6088137c986642
                                                                      • Instruction Fuzzy Hash: 1A01A9B1B2824A82EB209F15A444539B7A0FB58B84F5C0035DA4CE3B98DF2CEA59CB00
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: InfoNativeSystem
                                                                      • String ID: Failed to set variant value.$d:\a\wix4\wix4\src\burn\engine\variable.cpp
                                                                      • API String ID: 1721193555-2731189036
                                                                      • Opcode ID: 51651b8b99521edf3b2065d24b1c0972709de01fabf245201aaf872e11e5ed41
                                                                      • Instruction ID: 2a028129b94f617950fa49d10ed2fcfb2360f4b50e4dca6442a91429e82b6ef7
                                                                      • Opcode Fuzzy Hash: 51651b8b99521edf3b2065d24b1c0972709de01fabf245201aaf872e11e5ed41
                                                                      • Instruction Fuzzy Hash: 13014472B28A8582D750DB11F4805AAB3A0FB94784F584135FA9ED7B59DF3CD958CB00
                                                                      APIs
                                                                        • Part of subcall function 00007FF6570E92C0: OpenProcessToken.ADVAPI32(?,00007FF6570E96E2), ref: 00007FF6570E92EA
                                                                        • Part of subcall function 00007FF6570E92C0: GetLastError.KERNEL32 ref: 00007FF6570E92F4
                                                                        • Part of subcall function 00007FF6570E92C0: CloseHandle.KERNEL32 ref: 00007FF6570E9495
                                                                      • IsWellKnownSid.ADVAPI32 ref: 00007FF6570E9720
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CloseErrorHandleKnownLastOpenProcessTokenWell
                                                                      • String ID: Failed to get TokenUser from process token.$d:\a\wix4\wix4\src\libs\dutil\wixtoolset.dutil\procutil.cpp
                                                                      • API String ID: 3112027504-95618751
                                                                      • Opcode ID: c0fb00d49a4fb78e57319cd994e959f9190896fe42b74e644aeaab94d7c369e2
                                                                      • Instruction ID: cbfec6323570803a32c4ad0398a3a57fd9a48b7c7dd544b409439e8a955edc08
                                                                      • Opcode Fuzzy Hash: c0fb00d49a4fb78e57319cd994e959f9190896fe42b74e644aeaab94d7c369e2
                                                                      • Instruction Fuzzy Hash: 33016DB6A18A4A86EF108F12E4002A977A4EB84B90F5C4131DA4CE7765DE3CD949C740
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: DefaultLangSystem
                                                                      • String ID: Failed to set variant value.$d:\a\wix4\wix4\src\burn\engine\variable.cpp
                                                                      • API String ID: 706401283-2731189036
                                                                      • Opcode ID: ebfd84084d59ec19a3c0dd7174503bd49dfbc01ee25f5b5bd8c4fd50321b90ed
                                                                      • Instruction ID: c16af40f3fddf632b681a52483f52ef0f7e8813b84f8037c905cbbbfcc059f12
                                                                      • Opcode Fuzzy Hash: ebfd84084d59ec19a3c0dd7174503bd49dfbc01ee25f5b5bd8c4fd50321b90ed
                                                                      • Instruction Fuzzy Hash: 4BE092A4B18A9682FF14DB11E8802B653A0AF98350F4C0039DD8DD7795DE3CE15D8700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: DefaultLangUser
                                                                      • String ID: Failed to set variant value.$d:\a\wix4\wix4\src\burn\engine\variable.cpp
                                                                      • API String ID: 768647712-2731189036
                                                                      • Opcode ID: 487de733fae6fef32328cc5a54f210b864faeda92fa39184569585251416f309
                                                                      • Instruction ID: 6b28a274a45e3aad875ee70741f84f51f4c94e9a7e6abba90c9ba13d5de7fd2d
                                                                      • Opcode Fuzzy Hash: 487de733fae6fef32328cc5a54f210b864faeda92fa39184569585251416f309
                                                                      • Instruction Fuzzy Hash: F0E0D8A4B18A9682FF14DB11E8802B663A0AF58350F4C4039DD8DD7791EE3CE16DCB10
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: DefaultLanguageUser
                                                                      • String ID: Failed to set variant value.$d:\a\wix4\wix4\src\burn\engine\variable.cpp
                                                                      • API String ID: 95929093-2731189036
                                                                      • Opcode ID: 5f210d7b2d89e8e477a15f0564f887c0e2e7e443ad61579b0c31903b7815b04c
                                                                      • Instruction ID: 23962c396695cc94f99bee11218484f425494c2b72f84a220f32c553292cecfd
                                                                      • Opcode Fuzzy Hash: 5f210d7b2d89e8e477a15f0564f887c0e2e7e443ad61579b0c31903b7815b04c
                                                                      • Instruction Fuzzy Hash: 94E092A4B18A9682FB149B11E8802B663A0AF58340F4C0039DD8DD7791DF3CE15DCB40
                                                                      APIs
                                                                      • CloseHandle.KERNEL32(?,?,?,00007FF6570891E3,?,?,00000000,00007FF657089AC8), ref: 00007FF6570A02A6
                                                                      • CloseHandle.KERNEL32(?,?,?,00007FF6570891E3,?,?,00000000,00007FF657089AC8), ref: 00007FF6570A02B9
                                                                      • CloseHandle.KERNEL32(?,?,?,00007FF6570891E3,?,?,00000000,00007FF657089AC8), ref: 00007FF6570A02CC
                                                                      • CloseHandle.KERNEL32(?,?,?,00007FF6570891E3,?,?,00000000,00007FF657089AC8), ref: 00007FF6570A02DF
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.1716194608.00007FF657081000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF657080000, based on PE: true
                                                                      • Associated: 00000000.00000002.1715987073.00007FF657080000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1717665063.00007FF6570FF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718727081.00007FF657136000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657139000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      • Associated: 00000000.00000002.1718750872.00007FF657140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff657080000_VmjvNTbD5J.jbxd
                                                                      Similarity
                                                                      • API ID: CloseHandle
                                                                      • String ID:
                                                                      • API String ID: 2962429428-0
                                                                      • Opcode ID: 248a4677ca020e95ef84e429e29d9649a36739842d52bb2f7058107c3b1b520b
                                                                      • Instruction ID: 0d8c5bb24bd3bf75ba667bd24b03a343b3c18fec6bcc6f0d6a5fba45809829f7
                                                                      • Opcode Fuzzy Hash: 248a4677ca020e95ef84e429e29d9649a36739842d52bb2f7058107c3b1b520b
                                                                      • Instruction Fuzzy Hash: 2B112EB2A06B4981EB548F60D59033973F4EF54FA8F590325CA6D965D8CF78D898C344